{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:29:44Z","timestamp":1778300984068,"version":"3.51.4"},"reference-count":15,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/policy.2002.1011295","type":"proceedings-article","created":{"date-parts":[[2003,6,25]],"date-time":"2003-06-25T16:42:54Z","timestamp":1056559374000},"page":"68-79","source":"Crossref","is-referenced-by-count":73,"title":["Requirements for policy languages for trust negotiation"],"prefix":"10.1109","author":[{"given":"K.E.","family":"Seamons","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"M.","family":"Winslett","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Ting Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"B.","family":"Smith","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"E.","family":"Child","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"J.","family":"Jacobson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"H.","family":"Mills","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"family":"Lina Yu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/502001.502004"},{"key":"13","article-title":"Limiting the disclosure of access control policies during automated trust negotiation","author":"seamons","year":"2001","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"14","article-title":"Internet credential acceptance policies","author":"seamons","year":"1997","journal-title":"Proceedings of the Workshop on Logic Programming for Internet Applications"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502005"},{"key":"12","article-title":"A practically implementable and tractable delegation logic","author":"li","year":"2000","journal-title":"IEEE Symposium on Security and Privacy"},{"key":"3","article-title":"The keynote trust-management system","volume":"2704","author":"blaze","year":"1999","journal-title":"RFC"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/4236.935172"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/373256.373264"},{"key":"10","article-title":"Advanced client\/server authentication in TLS","author":"hess","year":"2002","journal-title":"Proc Symp Network and Distributed System Security"},{"key":"7","first-page":"953","volume":"29","author":"chu","year":"1997","journal-title":"REFEREE Trust Management for Web Applications"},{"key":"6","article-title":"Regulating service access and information release on the web","author":"bonatti","year":"2000","journal-title":"7th ACM Conference on Computer and Communications Security"},{"key":"5","doi-asserted-by":"crossref","first-page":"254","DOI":"10.1007\/BFb0055488","article-title":"Compliance checking in the policymaker trust management system","author":"blaze","year":"1998","journal-title":"Financial Cryptography"},{"key":"4","author":"blaze","year":"1999","journal-title":"The Role of Trust Management in Distributed System Security"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"8","year":"0"}],"event":{"name":"Third International Workshop on Policies for Distributed Systems and Networks","location":"Monterey, CA, USA","acronym":"POLICY-02"},"container-title":["Proceedings Third International Workshop on Policies for Distributed Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/7903\/21795\/01011295.pdf?arnumber=1011295","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:40:46Z","timestamp":1497552046000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1011295\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/policy.2002.1011295","relation":{},"subject":[]}}