{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T20:27:21Z","timestamp":1693686441905},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2008,10,7]],"date-time":"2008-10-07T00:00:00Z","timestamp":1223337600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2009,2]]},"DOI":"10.1007\/s12243-008-0050-5","type":"journal-article","created":{"date-parts":[[2008,10,8]],"date-time":"2008-10-08T11:32:09Z","timestamp":1223465529000},"page":"155-169","source":"Crossref","is-referenced-by-count":21,"title":["XeNA: an access negotiation framework using XACML"],"prefix":"10.1007","volume":"64","author":[{"given":"Diala","family":"Abi Haidar","sequence":"first","affiliation":[]},{"given":"Nora","family":"Cuppens - Boulahia","sequence":"additional","affiliation":[]},{"given":"Fr\u00e9d\u00e9ric","family":"Cuppens","sequence":"additional","affiliation":[]},{"given":"Herv\u00e9","family":"Debar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,10,7]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Seamons KE, Chan T, Child E, Halcrow M, Hess A, Holt J, Jacobson J, Jarvis R, Patty A, Smith B, Sundelin T, Yu L (2003) TrustBuilder: negotiating trust in dynamic coalitions. In: Proceedings DARPA information survivability conference and exposition, vol 2. Washington, DC, pp 49\u201351, 22\u201324 April 2003","DOI":"10.1109\/DISCEX.2003.1194912"},{"key":"50_CR2","doi-asserted-by":"crossref","unstructured":"Smith B, Seamons KE, Jones MD (2004) Responding to policies at runtime in TrustBuilder. In: Proceedings of the fifth IEEE international workshop on policies for distributed systems and networks (POLICY\u201904). New York, pp 149\u2013158, 7\u20139 June 2004","DOI":"10.1109\/POLICY.2004.1309161"},{"key":"50_CR3","doi-asserted-by":"crossref","unstructured":"Seamons KE, Winslett M, Yu T, Chan T, Child E, Halcrow M, Hess A, Holt J, Jacobson J, Jarvis R, Patty A, Smith B, Sundelin T, Yu L (2003) Trust negotiation in dynamic coalitions. In: Proceedings of the DARPA information survivability conference and exposition (DISCEX\u201903), vol 2. Washington, DC, pp 240\u2013245, 22\u201324 April 2003","DOI":"10.1109\/DISCEX.2003.1194972"},{"key":"50_CR4","unstructured":"Yuan E, Tong J (2005) Attribute based access control (ABAC): a new access control approach for service oriented architectures. In: Ottawa new challenges for access control workshop. Ottawa, April 2005"},{"key":"50_CR5","unstructured":"Seamons K, Winslett M, Yu T (2001) Limiting the disclosure of access control policies during automated trust negotiation. In: Network and distributed system security symposium. San Diego, pp 45\u201356, April 2001"},{"key":"50_CR6","unstructured":"Thomas RK, Sandhu RS (1997) Task-based Authorization Controls(TBAC): a family of models for active and enterprise-oriented authorization management. In: Proceedings of the IFIP WG11.3 workshop on database security. Lake Tahoe, pp 166\u2013181, August 1997"},{"issue":"8","key":"50_CR7","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/360303.360333","volume":"19","author":"MA Harrison","year":"1976","unstructured":"Harrison MA, Ruzzo ML, Ullman JD (1976) Protection in operating systems. Commun ACM 19(8):461\u2013471","journal-title":"Commun ACM"},{"key":"50_CR8","unstructured":"Miege A (2005) Definition of a formal framework for specifying security policies. The Or-BAC model and extensions. PhD thesis, ENST, June"},{"issue":"2","key":"50_CR9","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"RS Sandhu","year":"1996","unstructured":"Sandhu RS, Coyne EJ, Feinstein HL, Youman CE (1996) Role-based access control models. Computer 29(2):38\u201347, February","journal-title":"Computer"},{"key":"50_CR10","unstructured":"eXtensible Access Control Markup Language (XACML) Version 2 (2005) Standard. OASIS, February"},{"key":"50_CR11","doi-asserted-by":"crossref","unstructured":"Herzberg A, Mass Y, Michaeli J, Ravid Y, Naor D (2000) Access control meets public key infrastructure, or: assigning roles to strangers. In: SP \u201900: proceedings of the 2000 IEEE symposium on security and privacy. IEEE Computer Society, Washington, DC, p 2","DOI":"10.1109\/SECPRI.2000.848442"},{"issue":"2","key":"50_CR12","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1023\/A:1008746126376","volume":"10","author":"NR Jennings","year":"2001","unstructured":"Jennings NR, Faratin P, Lomuscio AR, Parsons S, Wooldridge MJ, Sierra C (2001) Automated negotiation: Prospects, methods and challenges. Group Decis Negot 10(2):199\u2013215","journal-title":"Group Decis Negot"},{"key":"50_CR13","unstructured":"Christensen E, Curbera F, Meredith G, Weerawarana S (2001) Web Services Description Language (WSDL) 1.1. W3C note, Microsoft and IBM Research, March"},{"key":"50_CR14","doi-asserted-by":"crossref","unstructured":"Cuppens F, Cuppens-Boulahia N, Coma C (2006) O2O: virtual private organizations to manage security policy interoperability. In: ICISS. Delhi, pp 101\u2013115, 17\u201321 December 2006","DOI":"10.1007\/11961635_7"},{"key":"50_CR15","doi-asserted-by":"crossref","unstructured":"Moyer MJ, Abamad M (2001) Generalized role-based access control. In: 21st International conference on distributed computing systems. Mesa, pp 391\u2013398, 16\u201319 April 2001","DOI":"10.1109\/ICDSC.2001.918969"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Cuppens F, Mi\u00e8ge A (2003) Modelling contexts in the Or-BAC model. In: ACSAC. Las Vegas, p 416, 8\u201312 December 2003","DOI":"10.1109\/CSAC.2003.1254346"},{"key":"50_CR17","unstructured":"SAML 2.0 profile of XACML v2.0 (2005) Standard. OASIS, February"},{"key":"50_CR18","unstructured":"Core and hierarchical role based access control (RBAC) profile of XACML v2.0 (2005) Standard. OASIS, February"},{"issue":"3","key":"50_CR19","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"DF Ferraiolo","year":"2001","unstructured":"Ferraiolo DF, Sandhu R, Gavrila S, Kuhn DR, Chandramouli R (2001) Proposed NIST standard for role-based access control. ACM Trans Inf Syst Secur (TISSEC) 4(3):224\u2013274","journal-title":"ACM Trans Inf Syst Secur (TISSEC)"},{"key":"50_CR20","doi-asserted-by":"crossref","unstructured":"Haidar DA, Cuppens-Boulahia N, Cuppens F, Debar H (2006) An extended RBAC profile of XACML. In: Proceedings of 2006 ACM secure web services workshop (SWS). Fairfax, pp 13\u201322, November 2006","DOI":"10.1145\/1180367.1180372"},{"key":"50_CR21","unstructured":"Lee AJ (2007) TrustBuilder2 user manual version 0.1. Technical report, May"},{"key":"50_CR22","unstructured":"Security Assertion Markup Language (SAML) V2.0 Technical Overview (2006) Working draft 10. OASIS, October"}],"container-title":["annals of telecommunications - annales des t\u00e9l\u00e9communications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0050-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-008-0050-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-008-0050-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T02:37:59Z","timestamp":1559443079000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-008-0050-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,7]]},"references-count":22,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2009,2]]}},"alternative-id":["50"],"URL":"https:\/\/doi.org\/10.1007\/s12243-008-0050-5","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"value":"0003-4347","type":"print"},{"value":"1958-9395","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,10,7]]}}}