{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:29:42Z","timestamp":1778300982652,"version":"3.51.4"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540649519","type":"print"},{"value":"9783540539186","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0055488","type":"book-chapter","created":{"date-parts":[[2006,7,27]],"date-time":"2006-07-27T05:10:06Z","timestamp":1153977006000},"page":"254-274","source":"Crossref","is-referenced-by-count":109,"title":["Compliance checking in the PolicyMaker trust management system"],"prefix":"10.1007","author":[{"given":"Matt","family":"Blaze","sequence":"first","affiliation":[]},{"given":"Joan","family":"Feigenbaum","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Strauss","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"20_CR1","first-page":"164","volume-title":"Decentralized Trust Management","author":"M. Blaze","year":"1996","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized Trust Management, in Proceedings of the Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1996, pp. 164\u2013173."},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1002\/ett.4460080507","volume":"8","author":"M. Blaze","year":"1997","unstructured":"M. Blaze, J. Feigenbaum, P. Resnick, and M. Strauss, Managing Trust in an Information-Labeling System, European Transactions on Telecommunications, 8 (1997), pp. 491\u2013501. (Special issue of selected papers from the 1996 Amalfi Conference on Secure Communication in Networks.)","journal-title":"European Transactions on Telecommunications"},{"key":"20_CR3","first-page":"127","volume":"2","author":"Y.-H. Chu","year":"1997","unstructured":"Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, REFEREE: Trust Management for Web Applications, World Wide Web Journal, 2 (1997), pp. 127\u2013139. (Reprinted from Proceedings of the 6th International World Wide Web Conference, World Wide Web Consortium, Cambridge, 1997, pp. 227\u2013238.)","journal-title":"World Wide Web Journal"},{"key":"20_CR4","volume-title":"Cryptography and Data Security","author":"D. Denning","year":"1982","unstructured":"D. Denning, Cryptography and Data Security, Addison-Wesley, Reading, 1982."},{"key":"20_CR5","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1016\/S0019-9958(84)80056-X","volume":"61","author":"S. Even","year":"1984","unstructured":"S. Even, A. Selman, and Y. Yacobi, The Complexity of Promise Problems with Applications to Public-Key Cryptography, Information and Control, 61 (1984), pp. 159\u2013174.","journal-title":"Information and Control"},{"key":"20_CR6","volume-title":"Computers and Intractability: A Guide to the Theory of NP-Completeness","author":"M. Garey","year":"1979","unstructured":"M. Garey and D. Johnson, Computers and Intractability: A Guide to the Theory of NP-Completeness, Freeman, San Fancisco, 1979."},{"key":"20_CR7","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"M. A. Harrison","year":"1976","unstructured":"M. A. Harrison, W. L. Ruzzo, and J. D. Ullman, Protection in Operating Systems, Communications of the ACM, 19 (1976), pp. 461\u2013471.","journal-title":"Communications of the ACM"},{"key":"20_CR8","first-page":"33","volume-title":"A Linear Time Algorithm for Deciding Security","author":"A. K. Jones","year":"1976","unstructured":"A. K. Jones, R. J. Lipton, and L. Snyder, A Linear Time Algorithm for Deciding Security, in Proceedings of the Symposium on Foundations of Computer Science, IEEE Computer Society Press, Los Alamitos, 1976, pp. 33\u201341."},{"key":"20_CR9","first-page":"SS77","volume-title":"Music on the Internet and the Intellectual Property Protection Problem","author":"J. Lacy","year":"1997","unstructured":"J. Lacy, D. P. Maher, and J. H. Snyder, Music on the Internet and the Intellectual Property Protection Problem, in Proceedings of the International Symposium on Industrial Electronics, IEEE Press, New York, 1997, pp. SS77\u2013SS83."},{"key":"20_CR10","unstructured":"R. Levien, L. McCarthy, and M. Blaze, Transparent Internet E-mail Security, http:\/\/www.cs.umass.edu\/~lmccarth\/crypto\/papers\/email.ps"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/BF02122563","volume":"8","author":"E. Tardos","year":"1988","unstructured":"E. Tardos, The Gap Between Monotone and Non-monotone Circuit Complexity is Exponential, Combinatorica, 8 (1988), pp. 141\u2013142.","journal-title":"Combinatorica"},{"key":"20_CR12","doi-asserted-by":"crossref","first-page":"107","DOI":"10.3233\/JCS-1993-22-304","volume":"2","author":"T. Y. C. Woo","year":"1993","unstructured":"T. Y. C. Woo and S. S. Lam, Authorization in Distributed Systems: A New Approach, Journal of Computer Security, 2 (1993), pp. 107\u201336.","journal-title":"Journal of Computer Security"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0055488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,11]],"date-time":"2019-02-11T15:23:52Z","timestamp":1549898632000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0055488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540649519","9783540539186"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/bfb0055488","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998]]}}}