{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T20:04:26Z","timestamp":1748894666034},"reference-count":8,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231421","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"281-282","source":"Crossref","is-referenced-by-count":11,"title":["How much is \"enough\"? Risk in trust-based access control"],"prefix":"10.1109","author":[{"given":"N.","family":"Dimmock","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Secure Environments for Collaboration among Ubiquitous Roaming Entities","year":"0","author":"cahill","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"journal-title":"Safeware System Safety and Computers","year":"1995","author":"leveson","key":"ref6"},{"journal-title":"SPKI Certificate Theory","article-title":"IETF RFC-2963","year":"1999","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"ref7","article-title":"Trust for transpar-ent, ubiquitous collaboration","author":"shand","year":"2003","journal-title":"IEEE Conf on Pervasive Computing and Communications"},{"key":"ref2","first-page":"295","article-title":"Access control and trust in the use of widely distributed services","author":"bacon","year":"2001","journal-title":"Middleware 2001 LNCS 2218"},{"journal-title":"The Journal of Risk and Insurance","year":"2000","author":"anderson","key":"ref1"}],"event":{"name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","acronym":"ENABL-03","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231421.pdf?arnumber=1231421","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T20:41:47Z","timestamp":1489437707000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231421\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231421","relation":{},"subject":[]}}