{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:40:10Z","timestamp":1744062010003,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642328077"},{"type":"electronic","value":"9783642328084"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32808-4_34","type":"book-chapter","created":{"date-parts":[[2012,9,4]],"date-time":"2012-09-04T19:11:33Z","timestamp":1346785893000},"page":"372-383","source":"Crossref","is-referenced-by-count":1,"title":["Nonmonotonicity in Trust Management"],"prefix":"10.1007","author":[{"given":"Wojciech","family":"Pikulski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/BFb0055488","volume-title":"Financial Cryptography","author":"M. Blaze","year":"1998","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance Checking in the PolicyMaker Trust Management System. In: Hirschfeld, R. (ed.) FC 1998. LNCS, vol.\u00a01465, pp. 254\u2013274. Springer, Heidelberg (1998)"},{"key":"34_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote trust-management system, version 2. IETF RFC 2704 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"34_CR3","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proc. IEEE Symp. Security and Privacy, pp. 164\u2013173 (1996)"},{"key":"34_CR4","doi-asserted-by":"crossref","unstructured":"Chapin, P.C., Skalka, C., Wang, X.S.: Authorization in trust management: Features and foundations. ACM Comput. Surv.\u00a040 (2008)","DOI":"10.1145\/1380584.1380587"},{"key":"34_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-540-74810-6_9","volume-title":"Foundations of Security Analysis and Design IV","author":"M. Czenko","year":"2007","unstructured":"Czenko, M., Etalle, S., Li, D., Winsborough, W.: An Introduction to the Role Based Trust Management Framework RT. In: Aldini, A., Gorrieri, R. (eds.) FOSAD 2007. LNCS, vol.\u00a04677, pp. 246\u2013281. Springer, Heidelberg (2007)"},{"key":"34_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-46088-8_16","volume-title":"Financial Cryptography","author":"N. Li","year":"2002","unstructured":"Li, N., Feigenbaum, J.: Nonmonotonicity, User Interfaces, and Risk Assessment in Certificate Revocation (Position Paper). In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 157\u2013168. Springer, Heidelberg (2002)"},{"key":"34_CR7","unstructured":"Li, N., Mitchell, J., Winsborough, W.: Design of a Role-Based Trust-Management Framework. In: IEEE Symposium on Security and Privacy, pp. 114\u2013130. IEEE Computer Society Press (2002)"},{"key":"34_CR8","doi-asserted-by":"publisher","first-page":"35","DOI":"10.3233\/JCS-2003-11102","volume":"1","author":"N. Li","year":"2003","unstructured":"Li, N., Winsborough, W., Mitchell, J.: Distributed Credential Chain Discovery in Trust Management. J. Computer Security\u00a01, 35\u201386 (2003)","journal-title":"J. Computer Security"},{"key":"34_CR9","unstructured":"National Information Assurance (IA) Glossary, CNSS Instruction No. 4009, April 26 (2010)"},{"key":"34_CR10","unstructured":"Seamons, K.E., Winslett, M., Yu, T.: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. In: NDSS. The Internet Society (2001)"},{"key":"34_CR11","doi-asserted-by":"crossref","unstructured":"Seamons, K.E., Winslett, M., Yu, T., Smith, B., Child, E., Jacobson, J., Mills, H., Yu, L.: Requirements for policy languages for trust negotiation. In: Proc. Third Int. Policies for Distributed Systems and Networks Workshop, pp. 68\u201379 (2002)","DOI":"10.1109\/POLICY.2002.1011295"},{"key":"34_CR12","doi-asserted-by":"publisher","first-page":"447","DOI":"10.3233\/JCS-2007-15402","volume":"15","author":"C. Skalka","year":"2007","unstructured":"Skalka, C., Wang, X.S., Chapin, P.C.: Risk management for distributed authorization. Journal of Computer Security\u00a015, 447\u2013489 (2007)","journal-title":"Journal of Computer Security"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Winsborough, W.H., Jacobs, J.: Automated trust negotiation technology with attribute-based access control. In: Proc. DARPA Information Survivability Conf. and Exposition, pp. 60\u201362 (2003)","DOI":"10.1109\/DISCEX.2003.1194916"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attributed based access control (ABAC) for Web services. In: Proc. IEEE Int. Conf. Web Services, ICWS (2005)","DOI":"10.1109\/ICWS.2005.25"},{"key":"34_CR15","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/978-3-642-13446-3_9","volume-title":"Trust Management IV","author":"C. Dong","year":"2010","unstructured":"Dong, C., Dulay, N.: Shinren: Non-monotonic Trust Management for Distributed Systems. In: Nishigaki, M., J\u00f8sang, A., Murayama, Y., Marsh, S. (eds.) IFIPTM 2010. IFIP AICT, vol.\u00a0321, pp. 125\u2013140. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32808-4_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T21:21:58Z","timestamp":1744060918000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32808-4_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642328077","9783642328084"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32808-4_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}