{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T17:10:12Z","timestamp":1731431412292,"version":"3.28.0"},"reference-count":37,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Inf. Secur."],"published-print":{"date-parts":[[2007,3,12]]},"DOI":"10.1049\/iet-ifs:20060084","type":"journal-article","created":{"date-parts":[[2007,4,2]],"date-time":"2007-04-02T23:24:59Z","timestamp":1175556299000},"page":"27-35","source":"Crossref","is-referenced-by-count":17,"title":["Trusted P2P computing environments with role-based access control"],"prefix":"10.1049","volume":"1","author":[{"given":"J.S.","family":"Park","sequence":"first","affiliation":[{"name":"Laboratory for Applied Information Security Technology (LAIST), Syracuse University, Syracuse, NY 13244-4100, USA"}]},{"given":"G.","family":"An","sequence":"additional","affiliation":[{"name":"Laboratory for Applied Information Security Technology (LAIST), Syracuse University, Syracuse, NY 13244-4100, USA"}]},{"given":"D.","family":"Chandra","sequence":"additional","affiliation":[{"name":"Laboratory for Applied Information Security Technology (LAIST), Syracuse University, Syracuse, NY 13244-4100, USA"}]}],"member":"265","reference":[{"key":"10.1049\/iet-ifs:20060084_r1","first-page":"335","volume":"36","author":"Androutsellis-Theotokis","year":"2004"},{"key":"10.1049\/iet-ifs:20060084_r2","first-page":"1","author":"Yu","year":"2004","journal-title":"Proc. IEEE Symp. on Multi-Agent Security and Survivability"},{"key":"10.1049\/iet-ifs:20060084_r3","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1145\/1015864.1015894","volume":"47","author":"Bailes","year":"2004","ISSN":"http:\/\/id.crossref.org\/issn\/0001-0782","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r4","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/642611.642636","author":"Good","year":"2003","journal-title":"Proc. SIGCHI Conf. on Human Factors in Computing Systems"},{"journal-title":"Proc. 2nd International Workshop on Economics and Information Security","year":"2003","author":"Schechter","key":"10.1049\/iet-ifs:20060084_r5"},{"key":"10.1049\/iet-ifs:20060084_r6","doi-asserted-by":"crossref","first-page":"207","DOI":"10.1145\/382912.382913","volume":"3","author":"Ahn","year":"2000","ISSN":"http:\/\/id.crossref.org\/issn\/1094-9224","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r7","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"Ferraiolo, David","year":"2001","ISSN":"http:\/\/id.crossref.org\/issn\/1094-9224","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r8","first-page":"114","author":"Li","year":"2002","journal-title":"Proc. IEEE Symp. on Research in Security and Privacy"},{"key":"10.1049\/iet-ifs:20060084_r9","first-page":"126","author":"Li","year":"2004","journal-title":"Proc. 9th ACM Symp. on Access Control Models and Technologies"},{"key":"10.1049\/iet-ifs:20060084_r10","unstructured":"\u2018The economic impact of role-based access control\u2019, Planning Report 02-1, National Institute of Standards and Technology (NIST), March, 2002"},{"key":"10.1049\/iet-ifs:20060084_r11","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"Sandhu","year":"1996","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9162","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r12","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1145\/383775.383777","volume":"4","author":"Park","year":"2001","ISSN":"http:\/\/id.crossref.org\/issn\/1094-9224","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r13","first-page":"19","author":"Park","year":"2001","journal-title":"Proc. 15th IFIP WG 11.3 Working Conference on Database and Application Security"},{"key":"10.1049\/iet-ifs:20060084_r14","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1145\/373256.373266","author":"Kang","year":"2001","journal-title":"Proc. 6th ACM Symp. on Access Control Models and Technologies"},{"key":"10.1049\/iet-ifs:20060084_r15","first-page":"93","author":"Park","year":"2003","journal-title":"Proc. 8th ACM Symp. on Access Control Models and Technologies"},{"key":"10.1049\/iet-ifs:20060084_r16","first-page":"536","author":"Nejdl","year":"2003","journal-title":"Proc. 12th Int. Conf. on World Wide Web"},{"journal-title":"Proc. 4th Int. Conf. on Peer-to-Peer Computing, Zurich","year":"2004","author":"Pyun","key":"10.1049\/iet-ifs:20060084_r17"},{"key":"10.1049\/iet-ifs:20060084_r18","unstructured":"Singla, A., and Rohrs, C.: \u2018Ultrapeers\u2013another step towards scalability\u2019, (Lime Wire LLC 2000 November),Version 1.0"},{"year":"1998","key":"10.1049\/iet-ifs:20060084_r19"},{"key":"10.1049\/iet-ifs:20060084_r20","unstructured":"\u2018ITU-T recommendation X.509. Information technology\u2013open systems interconnection \u2013 the directory: authentication framework\u2019, 1993)"},{"key":"10.1049\/iet-ifs:20060084_r21","unstructured":"\u2018Information technology\u2013open systems interconnection \u2013 the directory: authentication framework\u2019, 1997)"},{"key":"10.1049\/iet-ifs:20060084_r22","unstructured":"\u2018An internet attribute certificate profile for authorization\u2019, 2002)"},{"key":"10.1049\/iet-ifs:20060084_r23","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/986858.986873","author":"Saxena","year":"2003","journal-title":"Proc. 1st ACM Workshop on Security of Ad Hoc and Sensor Networks"},{"key":"10.1049\/iet-ifs:20060084_r24","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"Neuman","year":"1994","ISSN":"http:\/\/id.crossref.org\/issn\/0163-6804","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r25","first-page":"191","author":"Steiner","year":"1988","journal-title":"Proc. Winter USENIX Conf."},{"key":"10.1049\/iet-ifs:20060084_r26","unstructured":"\u2018Project JXTA, http:\/\/www.jxta.org\/\u2019, 2006),accessed"},{"key":"10.1049\/iet-ifs:20060084_r27","first-page":"95","author":"Fenkam","year":"2002","journal-title":"Proc. 11th IEEE Int. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises"},{"key":"10.1049\/iet-ifs:20060084_r28","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1145\/1063979.1064005","author":"Sandhu","year":"2005","journal-title":"Proc. 10th ACM Symp. on Access Control Models and Technologies"},{"key":"10.1049\/iet-ifs:20060084_r29","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/ACSAC.2000.898865","author":"Park","year":"2000","journal-title":"Proc. 16th IEEE Annual Computer Security Applications Conference"},{"key":"10.1049\/iet-ifs:20060084_r30","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MC.2002.1033037","volume":"35","author":"Shirky","year":"2002","ISSN":"http:\/\/id.crossref.org\/issn\/0018-9162","issn-type":"print"},{"key":"10.1049\/iet-ifs:20060084_r31","unstructured":"\u2018Web services architecture\u2019, 2004),http:\u2215\u2215www.w3.org\u2215TR\u2215ws-arch\u2215, accessed February"},{"journal-title":"Proc. 12th ACM Conf. on Computer and Communications Security","year":"2005","author":"Winslett","key":"10.1049\/iet-ifs:20060084_r32"},{"key":"10.1049\/iet-ifs:20060084_r33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318565"},{"key":"10.1049\/iet-ifs:20060084_r34","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1145\/507711.507728","author":"Zhang","year":"2002","journal-title":"Proc. Seventh ACM Symp. on Access Control Models and Technologies"},{"journal-title":"Proc. 35th Annual Hawaii Int. Conf. on System Sciences","year":"2002","author":"Kim","key":"10.1049\/iet-ifs:20060084_r35"},{"journal-title":"Proc. 38th Annual Hawaii Int. Conf. on System Sciences","year":"2005","author":"Tran","key":"10.1049\/iet-ifs:20060084_r36"},{"key":"10.1049\/iet-ifs:20060084_r37","first-page":"163","author":"Park","year":"2004","journal-title":"ACM Symp. on Access Control Models and Technologies"}],"container-title":["IET Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-ifs_20060084?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T16:28:31Z","timestamp":1731428911000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-ifs%3A20060084"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,12]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,3,12]]}},"alternative-id":["10.1049\/iet-ifs:20060084"],"URL":"https:\/\/doi.org\/10.1049\/iet-ifs:20060084","relation":{},"ISSN":["1751-8709","1751-8717"],"issn-type":[{"type":"print","value":"1751-8709"},{"type":"electronic","value":"1751-8717"}],"subject":[],"published":{"date-parts":[[2007,3,12]]}}}