{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:04:46Z","timestamp":1729652686468,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/percom.2009.4912748","type":"proceedings-article","created":{"date-parts":[[2009,5,11]],"date-time":"2009-05-11T18:19:49Z","timestamp":1242065989000},"page":"1-10","source":"Crossref","is-referenced-by-count":1,"title":["Distributed policy resolution through negotiation in ubiquitous computing environments"],"prefix":"10.1109","author":[{"given":"Venkatraman","family":"Ramakrishna","sequence":"first","affiliation":[]},{"given":"Peter","family":"Reiher","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Kleinrock","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-010-9125-6"},{"journal-title":"Foundations of Illocutionary Logic","year":"1984","author":"searle","key":"22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2002.993146"},{"key":"23","article-title":"security and management policy specification","volume":"16","author":"slornan","year":"2002","journal-title":"IEEE Network Special Issue on Policy-Based Networking (invited)"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1007\/11748625_14","article-title":"scalability in a secure distributed proof system","author":"minami","year":"2006","journal-title":"4th Intl Conference on Pervasive Computing"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-44875-6_20","article-title":"an introduction to trust negotiation","author":"winslett","year":"2003","journal-title":"1st International Conference on Trust Management"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"13","article-title":"no registration needed: how to use declarative policies and negotiation to access sensitive resources on the semantic web","author":"gavriloaie","year":"2004","journal-title":"1st First European Semantic Web Symposium"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"article-title":"panoply: active middleware for managing ubiquitous computing interactions","year":"2008","author":"eustice","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2002.1022279"},{"article-title":"policy management and interoperation through negotiation in ubiquitous computing","year":"2008","author":"ramakrishna","key":"21"},{"journal-title":"Regulating service access and information release on the web","year":"2000","author":"bonatti","key":"3"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/SOCA.2007.32"},{"key":"2","article-title":"towards a flexible middleware negotiation facility for distributed components","author":"andreoli","year":"2001","journal-title":"Proc DEXA E-Negotiation Workshop"},{"journal-title":"Web Services Agreement Specification (WS-Agreement)","year":"0","author":"andrieux","key":"1"},{"key":"10","article-title":"enabling secure ubiquitous interactions","author":"eustice","year":"2003","journal-title":"1st Intl Workshop on Middleware for Pervasive and Ad-Hoc Computing (at Middleware"},{"key":"7","article-title":"generalized role-based access control for securing future applications","author":"covington","year":"2000","journal-title":"23 rd National Information Systems Security Conference"},{"key":"6","article-title":"web services policy 1.2 framework (ws-policy)","author":"baa","year":"0","journal-title":"W3C Member Submission"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/185462.185477"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2005.13"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2006.118"},{"journal-title":"The Ponder policy specification language","year":"2001","author":"damianou","key":"8"}],"event":{"name":"2009 IEEE International Conference on Pervasive Computing and Communications (PerCom)","start":{"date-parts":[[2009,3,9]]},"location":"Galveston, TX, USA","end":{"date-parts":[[2009,3,13]]}},"container-title":["2009 IEEE International Conference on Pervasive Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4906860\/4912739\/04912748.pdf?arnumber=4912748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:22:19Z","timestamp":1558311739000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4912748\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/percom.2009.4912748","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}