{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:10:51Z","timestamp":1730214651913,"version":"3.28.0"},"reference-count":7,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194916","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T14:34:28Z","timestamp":1079966068000},"page":"60-62","source":"Crossref","is-referenced-by-count":3,"title":["Automated trust negotiation technology with attribute-based access control"],"prefix":"10.1109","volume":"2","author":[{"given":"W.H.","family":"Winsborough","sequence":"first","affiliation":[]},{"given":"J.","family":"Jacobs","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/644527.644532"},{"key":"ref3","article-title":"Marianne Winslett, and Ting Yu. Limiting the disclosure of access control policies during automated trust negotiation","author":"seamons","year":"2001","journal-title":"Proc Network and Distributed System Security Symp (NDSS"},{"key":"ref6","first-page":"88","article-title":"Automated trust negotiation","volume":"i","author":"winsborough","year":"2000","journal-title":"DARPA Information Survivability Conference and Exposition"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"ref7","article-title":"Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation","author":"ting","year":"0","journal-title":"ACM Transactions on Information and System Security (TISSEC) to appear Extended abstract appeared in Proceedings of the Eight ACM Conference on Computer and Communications Security (CcS-B)"},{"key":"ref2","article-title":"Distributed credential chain discovery in trust managemen1t","author":"ninghui","year":"0","journal-title":"Journal of Computer Security Extended abstract appeared in Proceedings of the Eighth ACM Conference on Computer and Communications Security (CCS-B)"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/SECPRI.2002.1004366"}],"event":{"acronym":"DISCEX-03","name":"DARPA Information Survivability Conference and Exposition","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194916.pdf?arnumber=1194916","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T21:37:06Z","timestamp":1489441026000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194916\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":7,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194916","relation":{},"subject":[]}}