{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T23:20:54Z","timestamp":1743117654402,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642176494"},{"type":"electronic","value":"9783642176500"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17650-0_3","type":"book-chapter","created":{"date-parts":[[2010,12,6]],"date-time":"2010-12-06T10:22:11Z","timestamp":1291630931000},"page":"16-30","source":"Crossref","is-referenced-by-count":4,"title":["Fine-Grained Disclosure of Access Policies"],"prefix":"10.1007","author":[{"given":"Claudio Agostino","family":"Ardagna","sequence":"first","affiliation":[]},{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"additional","affiliation":[]},{"given":"Sara","family":"Foresti","sequence":"additional","affiliation":[]},{"given":"Gregory","family":"Neven","sequence":"additional","affiliation":[]},{"given":"Stefano","family":"Paraboschi","sequence":"additional","affiliation":[]},{"given":"Franz-Stefan","family":"Preiss","sequence":"additional","affiliation":[]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Verdicchio","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Ardagna, C., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Minimizing disclosure of private information in credential-based interactions: A graph-based approach. In: Proc. of PASSAT 2010, Minneapolis, USA (August 2010)","DOI":"10.1109\/SocialCom.2010.115"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Ardagna, C., De Capitani di Vimercati, S., Foresti, S., Paraboschi, S., Samarati, P.: Supporting privacy preferences in credential-based interactions. In: Proc. of WPES 2010, Chicago, USA (October 2010)","DOI":"10.1145\/1866919.1866931"},{"key":"3_CR3","unstructured":"Ardagna, C., De Capitani di Vimercati, S., Paraboschi, S., Pedrini, E., Samarati, P., Verdicchio, M.: Expressive and deployable access control in open Web service applications. In: IEEE TSC (to appear, 2010)"},{"issue":"3","key":"3_CR4","doi-asserted-by":"publisher","first-page":"241","DOI":"10.3233\/JCS-2002-10303","volume":"10","author":"P. Bonatti","year":"2002","unstructured":"Bonatti, P., Samarati, P.: A unified framework for regulating access and information release on the Web. JCS\u00a010(3), 241\u2013272 (2002)","journal-title":"JCS"},{"key":"3_CR5","volume-title":"Logics for Emerging Applications of Databases","author":"P. Bonatti","year":"2003","unstructured":"Bonatti, P., Samarati, P.: Logics for authorizations and security. In: Chomicki, J., et al. (eds.) Logics for Emerging Applications of Databases. Springer, Heidelberg (2003)"},{"key":"3_CR6","unstructured":"Bonatti, P., Olmedilla, D.: Driving and monitoring provisional trust negotiation with metapolicies. In: Proc. of POLICY 2005, Stockholm, Sweden (June 2005)"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, p. 93. Springer, Heidelberg (2001)"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Cimato, S., Gamassi, M., Piuri, V., Sassi, R., Scotti, F.: Privacy-aware biometrics: Design and implementation of a multimodal verification system. In: Proc. of ACSAC 2008, Anaheim, USA (December 2008)","DOI":"10.1109\/ACSAC.2008.13"},{"key":"3_CR9","unstructured":"eXtensible Access Control Markup Language (XACML) v2.0 (February 2005), \n                    \n                      http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf"},{"issue":"10","key":"3_CR10","first-page":"1259","volume":"55","author":"K. Frikken","year":"2006","unstructured":"Frikken, K., Atallah, M., Li, J.: Attribute-based access control with hidden policies and hidden credentials. IEEE TC\u00a055(10), 1259\u20131270 (2006)","journal-title":"IEEE TC"},{"key":"3_CR11","unstructured":"Gamassi, M., Lazzaroni, M., Misino, M., Piuri, V., Sana, D., Scotti, F.: Accuracy and performance of biometric systems. In: Proc. of IMTC 2004, Como, Italy (May 2004)"},{"key":"3_CR12","unstructured":"Gamassi, M., Piuri, V., Sana, D., Scotti, F.: Robust fingerprint detection for access control. In: Proc. of RoboCare Workshop 2005, Rome, Italy (May 2005)"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"Irwin, K., Yu, T.: Preventing attribute information leakage in automated trust negotiation. In: Proc. of CCS 2005, Alexandria, USA (November 2005)","DOI":"10.1145\/1102120.1102128"},{"issue":"1","key":"3_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1330295.1330297","volume":"11","author":"A. Lee","year":"2008","unstructured":"Lee, A., Winslett, M., Basney, J., Welch, V.: The Traust authorization service. ACM TISSEC\u00a011(1), 1\u20133 (2008)","journal-title":"ACM TISSEC"},{"key":"3_CR15","unstructured":"Yu, T., Winslett, M.: A unified scheme for resource protection in automated trust negotiation. In: Proc. of IEEE S&P 2003, Berkeley, USA (May 2003)"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17650-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,25]],"date-time":"2019-08-25T20:16:41Z","timestamp":1566764201000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17650-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642176494","9783642176500"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17650-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}