{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T01:15:44Z","timestamp":1729646144215,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/discex.2003.1194968","type":"proceedings-article","created":{"date-parts":[[2004,3,22]],"date-time":"2004-03-22T09:34:28Z","timestamp":1079948068000},"page":"216-221","source":"Crossref","is-referenced-by-count":8,"title":["A framework for automated negotiation of access control policies"],"prefix":"10.1109","volume":"2","author":[{"given":"V.G.","family":"Bharadwaj","sequence":"first","affiliation":[]},{"given":"J.S.","family":"Baras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(94)90033-7"},{"journal-title":"Negotiation and management of coalition resources","year":"2002","author":"khurana","key":"ref11"},{"article-title":"Artificial Intelligence: A Modern Approach","year":"1995","author":"russell","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"ref14","article-title":"Secure virtual enclaves: Supporting coalition use of distributed application technologies","author":"shands","year":"2000","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)"},{"key":"ref15","article-title":"Automated trust negotiation","author":"winsborough","year":"2000","journal-title":"Proc DARPA Information Survivability Conference and Exposition (DISCEX)"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/383721.383725"},{"key":"ref3","first-page":"201","article-title":"Semiring-based constraint solving and optimization","volume":"44","author":"bistarelli","year":"1997","journal-title":"Journal of the A CM"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026441215081"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/3-540-45807-7_28","article-title":"On the negotiation of access control poli-cies","volume":"2467","author":"gligor","year":"2001","journal-title":"Lecture Notes in Computer Science"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49481-2_16"},{"key":"ref2","article-title":"SCSPs for modelling attacks to security protocols","author":"bella","year":"2000","journal-title":"Principle and Practice of Constraint Programming-CP2000 Workshop on Soft Constraints"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"}],"event":{"name":"DARPA Information Survivability Conference and Exposition","acronym":"DISCEX-03","location":"Washington, DC, USA"},"container-title":["Proceedings DARPA Information Survivability Conference and Exposition"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8503\/26876\/01194968.pdf?arnumber=1194968","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:25:41Z","timestamp":1497572741000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1194968\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/discex.2003.1194968","relation":{},"subject":[]}}