{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T16:40:03Z","timestamp":1769186403104,"version":"3.49.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icdim.2010.5664658","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T20:28:00Z","timestamp":1292358480000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Risk management in dynamic role based access control systems"],"prefix":"10.1109","author":[{"given":"J.","family":"Ma","sequence":"first","affiliation":[]},{"given":"K.","family":"Adi","sequence":"additional","affiliation":[]},{"given":"L.","family":"Logrippo","sequence":"additional","affiliation":[]},{"given":"Serge","family":"Mankovski","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0114(98)00288-7"},{"key":"ref11","first-page":"221","article-title":"Formal analysis of models for the dynamics of trust based on experiences","author":"jonker","year":"1999","journal-title":"Proceedings of Multi-Agent System Engineering'99 volume 1647 of LNAI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055874"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"451","DOI":"10.1109\/TSMCA.2006.871628","article-title":"Trust management and trust theory revision","volume":"36","author":"ma","year":"2006","journal-title":"IEEE Transactions on Systems Man and Cybernetics Part A"},{"key":"ref14","first-page":"58","article-title":"Ontology revision as non-prioritized belief revision","author":"mazzieri","year":"2007","journal-title":"ESOE"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2007.4419721"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2007.28"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/BFb0055488","article-title":"Compliance checking in the policymaker trust management system","author":"blaze","year":"1998","journal-title":"Financial Cryptography"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028183"},{"key":"ref5","first-page":"284","article-title":"Experience with the keynote trust management system: Applications and future directions","author":"blaze","year":"2003","journal-title":"iTrust"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/13.1.3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/990036.990062"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30555-2_18"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2007.93"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/QEST.2007.18"}],"event":{"name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","location":"Thunder Bay, ON, Canada","start":{"date-parts":[[2010,7,5]]},"end":{"date-parts":[[2010,7,8]]}},"container-title":["2010 Fifth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644872\/5662242\/05664658.pdf?arnumber=5664658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T17:14:39Z","timestamp":1497892479000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5664658\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icdim.2010.5664658","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}