{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:57Z","timestamp":1725562617545},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_15","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"195-208","source":"Crossref","is-referenced-by-count":3,"title":["Credential Chain Discovery in RTT Trust Management Language"],"prefix":"10.1007","author":[{"given":"Krzysztof","family":"Sacha","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","first-page":"164","volume-title":"17th IEEE Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: 17th IEEE Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"15_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/BFb0055488","volume-title":"Financial Cryptography","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust Management System. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 254\u2013274. Springer, Heidelberg (1998)"},{"doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J.: The KeyNote Trust Management System Version 2. Internet Society, Network Working Group, RFC 2704 (1999)","key":"15_CR3","DOI":"10.17487\/rfc2704"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1380584.1380587","volume":"3","author":"P. Chapin","year":"2008","unstructured":"Chapin, P., Skalka, C., Wang, X.: Authorization in Trust Management: Features and Foundations. ACM Comput. Survey\u00a03, 1\u201348 (2008)","journal-title":"ACM Comput. Survey"},{"key":"15_CR5","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI\/SDSI. J. Computer Security\u00a09, 285\u2013322 (2001)","journal-title":"J. Computer Security"},{"key":"15_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-74810-6_9","volume-title":"Foundations of Security Analysis and Design IV","author":"M. Czenko","year":"2007","unstructured":"Czenko, M., Etalle, S., Li, D., Winsborough, W.: An Introduction to the Role Based Trust Management Framework RT. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.\u00a04677, pp. 246\u2013281. Springer, Heidelberg (2007)"},{"unstructured":"Felkner, A., Sacha, K.: The Semantics of Role-Based Trust Management Languages. In: 4th IFIP Central and East European Conference on Software Engineering Techniques, pp. 195\u2013206 (2009)","key":"15_CR7"},{"key":"15_CR8","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"3","author":"D. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D., Chandramouli, R.: Proposed NIST Standard for Role-Based Access control. ACM Trans. Inf. Syst. Secur.\u00a03, 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"15_CR9","first-page":"213","volume-title":"8th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming","author":"D. Gorla","year":"2006","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Inferring Dynamic Credentials for Role-Based Trust Management. In: 8th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, pp. 213\u2013224. ACM, New York (2006)"},{"key":"15_CR10","volume-title":"Modeling Languages: Syntax, Semantics and All That Stuff, Part I: The Basic Stuff","author":"D. Harel","year":"2000","unstructured":"Harel, D., Rumpe, B.: Modeling Languages: Syntax, Semantics and All That Stuff, Part I: The Basic Stuff. Weizmann Science Press of Israel, Jerusalem (2000)"},{"key":"15_CR11","first-page":"114","volume-title":"IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a Role-Based Trust-Management Framework. In: IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"15_CR12","first-page":"201","volume-title":"3rd DARPA Information Survivability Conference and Exposition","author":"N. Li","year":"2003","unstructured":"Li, N., Mitchell, J.: RT: A Role-Based Trust-Management Framework. In: 3rd DARPA Information Survivability Conference and Exposition, pp. 201\u2013212. IEEE Computer Society Press, Los Alamitos (2003)"},{"key":"15_CR13","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"1","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. J. Computer Security\u00a01, 35\u201386 (2003)","journal-title":"J. Computer Security"},{"key":"15_CR14","volume-title":"International Workshop on Modeling in Software Engineering","author":"M. Reith","year":"2007","unstructured":"Reith, M., Niu, J., Winsborough, W.: Engineering Trust Management into Software Models. In: International Workshop on Modeling in Software Engineering. IEEE Computer Society, Los Alamitos (2007)"},{"doi-asserted-by":"crossref","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a0(2), 38\u201347 (1996)","key":"15_CR15","DOI":"10.1109\/2.485845"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:33Z","timestamp":1606186593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}