{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:27:09Z","timestamp":1775179629352,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194885","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"201-212","source":"Crossref","is-referenced-by-count":11,"title":["RT: a Role-based Trust-management framework"],"prefix":"10.1109","author":[{"family":"Ninghui Li","sequence":"first","affiliation":[]},{"given":"J.C.","family":"Mitchell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004365"},{"key":"ref11","article-title":"SPKI certificate theory","author":"ellison","year":"1999","journal-title":"RFC 2693 IETF"},{"key":"ref12","author":"howell","year":"2000","journal-title":"Naming and sharing resources acroos administrative boundaries"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2001.924291"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1006\/jcss.1995.1051","article-title":"Constraint query languages","volume":"51","author":"paris","year":"1995","journal-title":"Journal of Computer and System Sciences"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-04031-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/138873.138874"},{"key":"ref17","article-title":"Delegation Logic: A logic-based approach to distributed authorization","volume":"6","author":"ninghui","year":"2003","journal-title":"ACM Transaction on Information and System Security (TISSEC)"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1007\/3-540-36388-2_6","article-title":"Datalog with constraints: A foundation for trust management languages","author":"li","year":"2003","journal-title":"Proceedings of the Fifth International Symposium on Practical Aspects of Declarative Languages (PADL 2003)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004366"},{"key":"ref4","article-title":"A general and flexible access-control system for the web","author":"bauer","year":"2002","journal-title":"Proceedings of the 11th USENIX Security Symposium"},{"key":"ref3","article-title":"A note on SPKI's authorization syntax","author":"bandmann","year":"2002","journal-title":"Pre-Proc 1st Ann PKI Workshop"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref5","article-title":"The KeyNote trust-management system, version 2","author":"blaze","year":"1999","journal-title":"IETF RFC 2704"},{"key":"ref8","article-title":"Mobile code security by Java bytecode instrumentation","author":"ajay","year":"2001","journal-title":"Proc DARPA Information Survivability Conf and Exposition (DISCEX III)"},{"key":"ref7","article-title":"Namespaces in XML","author":"bray","year":"1999","journal-title":"W3C Recommendation"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.1145\/319709.319718","article-title":"Proof-carrying authentication","volume":"ccs 6","author":"appel","year":"1999","journal-title":"Proceedings of 6th ACM Conference on Computer and Communications Security"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/SP.1987.10001","article-title":"A comparision of commercial and military computer security policies","author":"clark","year":"1987","journal-title":"Proceedings of the 1987 IEEE Symposium on Security and Privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155225"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","article-title":"Distributed credential chain discovery in trust management","volume":"11","author":"ninghui","year":"2003","journal-title":"Journal of Computer Security"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref21","article-title":"SDSI &#x2014; a simple distributed security infrastructure","author":"rivest","year":"1996"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644532"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CSFW.1997.596811"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011297"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","location":"Washington, DC, USA","acronym":"DISCEX-03"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26875\/01194885.pdf?arnumber=1194885","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,6,14]],"date-time":"2021-06-14T19:34:45Z","timestamp":1623699285000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194885\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194885","relation":{},"subject":[]}}