{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:15:45Z","timestamp":1743030945715,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642224430"},{"type":"electronic","value":"9783642224447"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22444-7_5","type":"book-chapter","created":{"date-parts":[[2011,10,5]],"date-time":"2011-10-05T21:29:33Z","timestamp":1317850173000},"page":"68-83","source":"Crossref","is-referenced-by-count":0,"title":["A Case Study in Decentralized, Dynamic, Policy-Based, Authorization and Trust Management \u2013 Automated Software Distribution for Airplanes"],"prefix":"10.1007","author":[{"given":"Peter","family":"Hartmann","sequence":"first","affiliation":[]},{"given":"Monika","family":"Maidl","sequence":"additional","affiliation":[]},{"given":"David","family":"von Oheimb","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Robinson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"The WS-*, SAML and XACML standards are, \n                  \n                    http:\/\/www.oasis-open.org\/specs\/"},{"key":"5_CR2","unstructured":"Microsoft Corporation: Introducing Windows CardSpace, \n                  \n                    http:\/\/msdn.microsoft.com\/en-us\/library\/aa480189.aspx"},{"key":"5_CR3","unstructured":"Soghoian, C., Stamm, S.: Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL. (under submission)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/978-3-540-87698-4_34","volume-title":"Computer Safety, Reliability, and Security","author":"M. Maidl","year":"2008","unstructured":"Maidl, M., von Oheimb, D., Hartmann, P., Robinson, R.: Formal security analysis of electronic software distribution systems. In: Harrison, M.D., Sujan, M.-A. (eds.) SAFECOMP 2008. LNCS, vol.\u00a05219, pp. 415\u2013428. Springer, Heidelberg (2008)"},{"key":"5_CR5","unstructured":"Nigriny, J., Phaltankar, K.: Identity Assurance in Commercial Aviation Facilitated Through a Trusted Third Party Hub. White paper of CertiPath, \n                  \n                    http:\/\/www.certipath.com\/white-papers.htm"},{"key":"5_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/CSF.2007.18","volume-title":"20th IEEE Computer Security Foundations Symposium","author":"M. Becker","year":"2007","unstructured":"Becker, M., Fournet, C., Gordon, A.: SecPAL: Design and Semantics of a Decentralized Authorization Language. In: 20th IEEE Computer Security Foundations Symposium, pp. 3\u201315. IEEE Press, New York (2007)"},{"key":"5_CR7","unstructured":"SecPAL homepage, \n                  \n                    http:\/\/research.microsoft.com\/en-us\/projects\/SecPAL\/"},{"key":"5_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","volume-title":"Practical Aspects of Declarative Languages","author":"N. Li","year":"2002","unstructured":"Li, N., Mitchell, J.C.: DATALOG with constraints: A foundation for trust management languages. In: Dahl, V. (ed.) PADL 2003. LNCS, vol.\u00a02562, pp. 58\u201373. Springer, Heidelberg (2002)"},{"key":"5_CR9","unstructured":"IBM Corporation and Microsoft Corporation: Security in a Web Services World: A Proposed Architecture and Roadmap (2002), \n                  \n                    http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-secmap\/"},{"issue":"4","key":"5_CR10","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"5_CR11","first-page":"105","volume-title":"IEEE Symposium on Security and Privacy","author":"J. DeTreville","year":"2002","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: IEEE Symposium on Security and Privacy, pp. 105\u2013113. IEEE Press, New York (2002)"},{"issue":"1","key":"5_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B., Feigenbaum, J.: Delegation Logic. ACM Trans. on Information and System Security (TISSEC)\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Trans. on Information and System Security (TISSEC)"},{"key":"5_CR13","volume-title":"17th IEEE Computer Security Foundations Workshop (CSFW)","author":"M. Becker","year":"2004","unstructured":"Becker, M., Sewell, P.: Cassandra: Flexible trust management, Applied to Electronic Health Records. In: 17th IEEE Computer Security Foundations Workshop (CSFW). IEEE Press, New York (2004)"},{"key":"5_CR14","volume-title":"17th IEEE Computer Security Foundations Workshop (CSFW)","author":"J.Y. Halpern","year":"2004","unstructured":"Halpern, J.Y., Weissmann, V.: A formal foundation of XrML. In: 17th IEEE Computer Security Foundations Workshop (CSFW). IEEE Press, New York (2004)"},{"key":"5_CR15","first-page":"89","volume-title":"16th IEEE Computer Security Foundations Workshop (CSFW)","author":"N. Li","year":"2003","unstructured":"Li, N., Mitchell, J.C.: Understanding SPKI\/SDSI using first-order logic. In: 16th IEEE Computer Security Foundations Workshop (CSFW), pp. 89\u2013103. IEEE Press, New York (2003)"},{"key":"5_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11691372_1","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Jha","year":"2006","unstructured":"Jha, S., Schwoon, S., Wang, H., Reps, T.: Weighted Pushdown Systems and Trust-Management Systems. In: Hermanns, H. (ed.) TACAS 2006. LNCS, vol.\u00a03920, pp. 1\u201326. Springer, Heidelberg (2006)"},{"key":"5_CR17","first-page":"149","volume-title":"21th IEEE Computer Security Foundations Workshop (CSFW)","author":"Y. Gurevich","year":"2008","unstructured":"Gurevich, Y., Neeman, I.: DKAL: Distributed-Knowledge Authorization Language. In: 21th IEEE Computer Security Foundations Workshop (CSFW), pp. 149\u2013162. IEEE Press, New York (2008)"},{"key":"5_CR18","unstructured":"Gurevich, Y., Neeman, I.: A Simplified and Improved Authorization Language. Microsoft Research Tech Report (February 2009), \n                  \n                    http:\/\/research.microsoft.com\/en-us\/um\/people\/gurevich\/dkal.htm"},{"key":"5_CR19","unstructured":"EU-funded project AVANTSSAR: Automated Validation of Trust and Security of Service-oriented Architectures, \n                  \n                    http:\/\/avantssar.eu\/"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22444-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:08:01Z","timestamp":1558296481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22444-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642224430","9783642224447"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22444-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}