{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T01:59:56Z","timestamp":1742954396306,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642238215"},{"type":"electronic","value":"9783642238222"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23822-2_15","type":"book-chapter","created":{"date-parts":[[2011,9,7]],"date-time":"2011-09-07T14:38:34Z","timestamp":1315406314000},"page":"262-277","source":"Crossref","is-referenced-by-count":2,"title":["Socially Constructed Trust for Distributed Authorization"],"prefix":"10.1007","author":[{"given":"Steve","family":"Barker","sequence":"first","affiliation":[]},{"given":"Valerio","family":"Genovese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/j.entcs.2007.02.002","volume":"172","author":"M. Abadi","year":"2007","unstructured":"Abadi, M.: Access control in a core calculus of dependency. Electr. Notes Theor. Comput. Sci.\u00a0172, 5\u201331 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"key":"15_CR2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543357","volume-title":"Knowledge Representation, Reasoning and Declarative Problem Solving","author":"C. Baral","year":"2003","unstructured":"Baral, C.: Knowledge Representation, Reasoning and Declarative Problem Solving. Cambridge University Press, Cambridge (2003)"},{"key":"15_CR3","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/0743-1066(94)90025-6","volume":"19\/20","author":"C. Baral","year":"1994","unstructured":"Baral, C., Gelfond, M.: Logic programming and knowledge representation. J. Log. Program.\u00a019\/20, 73\u2013148 (1994)","journal-title":"J. Log. Program."},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Barker, S.: The next 700 access control models or a unifying meta-model? In: Procs. of SACMAT, pp. 187\u2013196 (2009)","DOI":"10.1145\/1542207.1542238"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-20895-9_34","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"S. Barker","year":"2011","unstructured":"Barker, S., Genovese, V.: Secommunity: A framework for distributed access control. In: Delgrande, J.P., Faber, W. (eds.) LPNMR 2011. LNCS, vol.\u00a06645, pp. 297\u2013303. Springer, Heidelberg (2011)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Barker, S., Sergot, M.J., Wijesekera, D.: Status-based access control. ACM Trans. Inf. Syst. Secur.\u00a012(1) (2008)","DOI":"10.1145\/1410234.1410235"},{"issue":"4","key":"15_CR7","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/950191.950194","volume":"6","author":"S. Barker","year":"2003","unstructured":"Barker, S., Stuckey, P.: Flexible access control policy specification with constraint logic programming. ACM Trans. Inf. Syst. Secur.\u00a06(4), 501\u2013546 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Bell, D.E., LaPadula, L.J.: Secure computer system: Unified exposition and multics interpretation. MITRE-2997 (1976)","DOI":"10.21236\/ADA023588"},{"issue":"4","key":"15_CR9","doi-asserted-by":"publisher","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D.E. Clarke","year":"2001","unstructured":"Clarke, D.E., Elien, J.-E., Ellison, C.M., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in SPKI\/SDSI. J. Computer Security\u00a09(4), 285\u2013322 (2001)","journal-title":"J. Computer Security"},{"key":"15_CR10","unstructured":"Dell\u2019Armi, T., Faber, W., Ielpa, G., Leone, N., Pfeifer, G.: Aggregate functions in disjunctive logic programming: Semantics, complexity, and implementation in DLV. In: Procs. of IJCAI, pp. 847\u2013852 (2003)"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"DeTreville, J.: Binder, a logic-based security language. In: Proc. IEEE Symposium on Security and Privacy, pp. 105\u2013113 (2002)","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"15_CR12","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-3-540-72200-7_10","volume-title":"Logic Programming and Nonmonotonic Reasoning","author":"W. Faber","year":"2007","unstructured":"Faber, W., Leone, N.: On the complexity of answer set programming with aggregates. In: Baral, C., Brewka, G., Schlipf, J. (eds.) LPNMR 2007. LNCS (LNAI), vol.\u00a04483, pp. 97\u2013109. Springer, Heidelberg (2007)"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/10722599_9","volume-title":"Computer Security - ESORICS 2000","author":"J. Howell","year":"2000","unstructured":"Howell, J., Kotz, D.: A formal semantics for SPKI. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 140\u2013158. Springer, Heidelberg (2000)"},{"issue":"2","key":"15_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M., Subrahmaninan, V.: Flexible support for multiple access control policies. ACM TODS\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM TODS"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Jim, T.: SD3: A trust management system with certified evaluation. In: IEEE Symp. Security and Privacy, pp. 106\u2013115 (2001)","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/978-3-540-89982-2_10","volume-title":"Logic Programming","author":"N. Leone","year":"2008","unstructured":"Leone, N., Faber, W.: The DLV project: A tour from theory and research to applications and market. In: Garcia de la Banda, M., Pontelli, E. (eds.) ICLP 2008. LNCS, vol.\u00a05366, pp. 53\u201368. Springer, Heidelberg (2008)"},{"issue":"1","key":"15_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/605434.605438","volume":"6","author":"N. Li","year":"2003","unstructured":"Li, N., Grosof, B.N., Feigenbaum, J.: Delegation logic: A logic-based approach to distributed authorization. ACM Trans. Inf. Syst. Secur.\u00a06(1), 128\u2013171 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"15_CR18","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a role-based trust-management framework. In: Procs. of IEEE Symposium on Security and Privacy, pp. 114\u2013130 (2002)"},{"issue":"1","key":"15_CR19","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1016\/S0004-3702(03)00063-8","volume":"149","author":"C.-J. Liau","year":"2003","unstructured":"Liau, C.-J.: Belief, information acquisition, and trust in multi-agent systems\u2013a modal logic formulation. Artif. Intell.\u00a0149(1), 31\u201360 (2003)","journal-title":"Artif. Intell."},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/11737414_10","volume-title":"Functional and Logic Programming","author":"A. Pimlott","year":"2006","unstructured":"Pimlott, A., Kiselyov, O.: Soutei, a logic-based trust-management system. In: Hagiya, M. (ed.) FLOPS 2006. LNCS, vol.\u00a03945, pp. 130\u2013145. Springer, Heidelberg (2006)"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1093\/mind\/XIV.4.479","volume":"149","author":"B. Russell","year":"1905","unstructured":"Russell, B.: On denoting. Mind\u00a0149(1), 479\u2013493 (1905)","journal-title":"Mind"},{"issue":"2","key":"15_CR22","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"issue":"1","key":"15_CR23","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10207-006-0008-4","volume":"6","author":"S. Wang","year":"2007","unstructured":"Wang, S., Zhang, Y.: Handling distributed authorization with delegation through answer set programming. Int. J. Inf. Sec.\u00a06(1), 27\u201346 (2007)","journal-title":"Int. J. Inf. Sec."}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2011"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23822-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T23:20:32Z","timestamp":1741562432000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23822-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642238215","9783642238222"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23822-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}