{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:31:07Z","timestamp":1761708667293},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642221996"},{"type":"electronic","value":"9783642222009"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22200-9_1","type":"book-chapter","created":{"date-parts":[[2011,6,25]],"date-time":"2011-06-25T23:52:53Z","timestamp":1309045973000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["From Access Control to Trust Management, and Back \u2013 A Petition"],"prefix":"10.1007","author":[{"given":"Dieter","family":"Gollmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer systems: Mathematical foundations and model. Technical Report M74-244, The MITRE Corporation, Bedford, MA (May 1973)"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust-Management System Version 2, RFC 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"1_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"1_CR4","unstructured":"Bonatti, P.A., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of reputation-based and policy-based trust management. In: Semantic Web Policy Workshop in Conjunction with 4th International Semantic Web Conference, Galway, Ireland (November 2005)"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1505","DOI":"10.1007\/978-3-540-76843-2_26","volume-title":"On the Move to Meaningful Internet Systems 2007: CoopIS, DOA, ODBASE, GADA, and IS","author":"M. Colombo","year":"2007","unstructured":"Colombo, M., Martinelli, F., Mori, P., Petrocchi, M., Vaccarelli, A.: Fine grained access control with trust and reputation management for globus. In: Chung, S. (ed.) OTM 2007, Part II. LNCS, vol.\u00a04804, pp. 1505\u20131515. Springer, Heidelberg (2007)"},{"key":"1_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/3-540-49135-X_7","volume-title":"Security Protocols","author":"J. Feigenbaum","year":"1999","unstructured":"Feigenbaum, J.: Overview of the AT&T Labs trust-management project. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 45\u201350. Springer, Heidelberg (1999)"},{"key":"1_CR7","unstructured":"International Organisation for Standardization. Basic Reference Model for Open Systems Interconnection (OSI) Part 2: Security Architecture, Gen\u00e8ve, Switzerland (1989)"},{"issue":"3","key":"1_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2005.09.044","volume":"157","author":"D. Gollmann","year":"2006","unstructured":"Gollmann, D.: Why trust is bad for security. Electronic Notes on Theoretical Computer Science\u00a0157(3), 3\u20139 (2006)","journal-title":"Electronic Notes on Theoretical Computer Science"},{"key":"1_CR9","unstructured":"J\u00f8sang, A., Gollmann, D., Au, R.: A method for access authorisation through delegation networks. In: Safavi-Naini, R., Steketee, C., Susilo, W. (eds.) Proc. Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), Hobart, Australia. CRPIT, vol.\u00a054, pp. 165\u2013174 (2006)"},{"issue":"1","key":"1_CR10","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3233\/JCS-2008-16102","volume":"16","author":"K. Krukow","year":"2008","unstructured":"Krukow, K., Nielsen, M., Sassone, V.: A logical framework for history-based access control and reputation systems. Journal of Computer Security\u00a016(1), 63\u2013101 (2008)","journal-title":"Journal of Computer Security"},{"key":"1_CR11","volume-title":".NET Framework Security","author":"B.A. Macchia La","year":"2002","unstructured":"La Macchia, B.A., Lange, S., Lyons, M., Martin, R., Price, K.T.: .NET Framework Security. Addison-Wesley Professional, Boston (2002)"},{"issue":"4","key":"1_CR12","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"1_CR13","unstructured":"OASIS. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2.0. Technical report, OASIS Standard (March 2005)"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Sandhu, R.S., Ferraiolo, D., Kuhn, R.: The NIST model for role based access control: Toward a unified standard. In: Proceedings of the 5th ACM Workshop on Role Based Access Control, pp. 47\u201363 (July 2000)","DOI":"10.1145\/344287.344301"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/11814764_17","volume-title":"Ad-Hoc, Mobile, and Wireless Networks","author":"S. Sukumaran","year":"2006","unstructured":"Sukumaran, S., Blessing, E.: Reputation based localized access control for mobile ad-hoc networks. In: Kunz, T., Ravi, S.S. (eds.) ADHOC-NOW 2006. LNCS, vol.\u00a04104, pp. 197\u2013210. Springer, Heidelberg (2006)"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Yong, H.: Reputation and role based access control model for multi-domain environments. In: 2010 International Symposium on Intelligence Information Processing and Trusted Computing (IPTC), pp. 597\u2013600 (October 2010)","DOI":"10.1109\/IPTC.2010.64"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Zemanek, H.: Was ist Informatik? Elektronische Rechenanlagen, 157\u2013161 (1971)","DOI":"10.1524\/itit.1971.13.16.157"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22200-9_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,26]],"date-time":"2021-11-26T19:53:32Z","timestamp":1637956412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22200-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221996","9783642222009"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22200-9_1","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2011]]}}}