{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:41:01Z","timestamp":1725493261531},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553806","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T10:35:25Z","timestamp":1215081325000},"page":"33-40","source":"Crossref","is-referenced-by-count":1,"title":["Unraveling decentralized authorization for multi-domain collaborations"],"prefix":"10.1109","author":[{"given":"Hannah K.","family":"Lee","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206964"},{"key":"ref11","article-title":"Requirements for technical specification, enforcement and management of collaborative workflow security policies, including separation of duties and time constraint","author":"lee","year":"2007","journal-title":"Towards e-Administration in the Large (R4eGov) Deliverable WP6-D2"},{"journal-title":"RFC 2692 SPKI Requirements","year":"1999","author":"ellison","key":"ref12"},{"journal-title":"RFC380 Internet X 509 Public Key Infrastructure Certificate and CRL Profile","year":"2002","author":"housley","key":"ref13"},{"journal-title":"RFC 3281 An Internet Attribute Certificate Profile for Authorization","year":"2002","author":"farrell","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-27696-0_1"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990044"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022279"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1314418.1314431"},{"journal-title":"Security Assertion Markup Language (SAML) 2 0 Technical Overview","year":"2005","author":"hughes","key":"ref19"},{"key":"ref4","article-title":"Final Master Case Study of Collaborative Public Sector","author":"boujraf","year":"2007","journal-title":"Towards e-Administration in the Large (R4eGov) Deliverable WP3-D7"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2006.63"},{"key":"ref3","article-title":"Organisational Interoperability Maturity Model for C2","author":"clark","year":"1999","journal-title":"1999 Command and Control Research and Technology Symposium"},{"key":"ref6","first-page":"21","article-title":"Ch2: Access Control Policies and Languages in Open Environments, Secure Data Management in Decentralized Systems","author":"di vimercati","year":"2007","journal-title":"Springer"},{"journal-title":"Council Decision of 28 February 2002 setting up Eurojust with a view to reinforcing the fight against serious crime (2002\/187\/JHA)","year":"2002","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990063"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref2","first-page":"24","article-title":"Domain Based Access Control Model for Distributed Collaborative Applications","author":"demchenko","year":"2006","journal-title":"E-SCIENCE '06 Proceedings of the Second IEEE International Conference on e-Science and Grid Computing"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WORDS.2005.18"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1133058.1133086"},{"journal-title":"RFC3460 Policy Core Information Model (PCIM) Extensions","year":"2007","author":"moore","key":"ref20"},{"journal-title":"SQUARE Process","year":"2007","author":"mead","key":"ref22"},{"journal-title":"eXtensible Access Control Markup Language (XACML) Version 2 0","year":"2005","key":"ref21"},{"key":"ref24","article-title":"The KeyNote Trust-Management System Version 2","author":"blaze","year":"1999","journal-title":"RFC 2704"},{"journal-title":"Security and dependability tropos tool","year":"7","key":"ref23"},{"journal-title":"RTML A Role-based Trust-management Markup Language","year":"2004","author":"li","key":"ref26"},{"key":"ref25","article-title":"Design of a Role-based Trust Management Framework","author":"li","year":"2002","journal-title":"Proc IEEE Symposium on Security and Privacy"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","start":{"date-parts":[[2007,11,12]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553806.pdf?arnumber=4553806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T19:18:40Z","timestamp":1489691920000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553806","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}