{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:34:45Z","timestamp":1725593685002},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642223648"},{"type":"electronic","value":"9783642223655"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22365-5_2","type":"book-chapter","created":{"date-parts":[[2011,6,27]],"date-time":"2011-06-27T22:07:06Z","timestamp":1309212426000},"page":"7-15","source":"Crossref","is-referenced-by-count":3,"title":["Time Validity in Role-Based Trust Management Inference System"],"prefix":"10.1007","author":[{"given":"Anna","family":"Felkner","sequence":"first","affiliation":[]},{"given":"Adam","family":"Kozakiewicz","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: 17th IEEE Symposium on Security and Privacy, Oakland, CA, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MIC.2003.1189190","volume":"2","author":"D. Chadwick","year":"2003","unstructured":"Chadwick, D., Otenko, A., Ball, E.: Role-Based Access Control with X.509 Attribute Certificates. IEEE Internet Comput.\u00a02, 62\u201369 (2003)","journal-title":"IEEE Internet Comput."},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1380584.1380587","volume":"3","author":"P. Chapin","year":"2008","unstructured":"Chapin, P., Skalka, C., Wang, X.S.: Authorization in Trust Management: Features and Foundations. ACM Comput. Surv.\u00a03, 1\u201348 (2008)","journal-title":"ACM Comput. Surv."},{"key":"2_CR4","series-title":"Foundations of Security Analysis and Design IV","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74810-6_9","volume-title":"An introduction to the role based trust management framework RT","author":"M. Czenko","year":"2007","unstructured":"Czenko, M., Etalle, S., Li, D., Winsborough, W.H.: An introduction to the role based trust management framework RT. Foundations of Security Analysis and Design IV. Springer, Heidelberg (2007)"},{"key":"2_CR5","unstructured":"Felkner, A.: Modeling Trust Management in Computer Systems. In: Proc. 9th International PhD Workshop OWD 2007, PTETiS, vol.\u00a023, pp. 65\u201370 (2007)"},{"key":"2_CR6","unstructured":"Felkner, A., Sacha, K.: The Semantics of Role-Based Trust Management Languages. In: CEE-SET 2009, pp. 195\u2013206 (2009) (preprints)"},{"issue":"1","key":"2_CR7","first-page":"9","volume":"4","author":"A. Felkner","year":"2010","unstructured":"Felkner, A., Sacha, K.: Deriving RTT Credentials for Role-Based Trust Management. e-Informatica Software Engineering Journal\u00a04(1), 9\u201319 (2010)","journal-title":"e-Informatica Software Engineering Journal"},{"key":"2_CR8","first-page":"213","volume-title":"Proc. 8th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming","author":"D. Gorla","year":"2006","unstructured":"Gorla, D., Hennessy, M., Sassone, V.: Inferring Dynamic Credentials for Role-Based Trust Management. In: Proc. 8th ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, pp. 213\u2013224. ACM, New York (2006)"},{"key":"2_CR9","first-page":"201","volume-title":"Proc. 3rd DARPA Information Survivability Conference and Exposition","author":"N. Li","year":"2003","unstructured":"Li, N., Mitchell, J.: RT: A Role-Based Trust-Management Framework. In: Proc. 3rd DARPA Information Survivability Conference and Exposition, pp. 201\u2013212. IEEE Computer Society Press, Oakland (2003)"},{"key":"2_CR10","first-page":"114","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a Role-Based Trust-Management Framework. In: Proc. IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press, Oakland (2002)"},{"key":"2_CR11","first-page":"123","volume-title":"Proc. IEEE Symposium on Security and Privacy","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W., Mitchell, J.: Beyond proof-of-Compliance: Safety and Availability Analysis in Trust Management. In: Proc. IEEE Symposium on Security and Privacy, pp. 123\u2013139. IEEE Computer Society Press, Oakland (2003)"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"1","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. J. Comput. Secur.\u00a01, 35\u201386 (2003)","journal-title":"J. Comput. Secur."}],"container-title":["Communications in Computer and Information Science","Secure and Trust Computing, Data Management, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22365-5_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,19]],"date-time":"2019-01-19T12:15:57Z","timestamp":1547900157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22365-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642223648","9783642223655"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22365-5_2","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}