{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:42:33Z","timestamp":1729672953403,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/policy.2003.1206965","type":"proceedings-article","created":{"date-parts":[[2004,3,1]],"date-time":"2004-03-01T21:26:50Z","timestamp":1078176410000},"page":"111-119","source":"Crossref","is-referenced-by-count":9,"title":["Towards automated negotiation of access control policies"],"prefix":"10.1109","author":[{"given":"V.G.","family":"Bharadwaj","sequence":"first","affiliation":[]},{"given":"J.S.","family":"Baras","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"181","article-title":"Russian doll search for solving constraint optimization problems","author":"verfaillie","year":"1996","journal-title":"Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"},{"key":"18","article-title":"Secure virtual enclaves: Supporting coalition use of distributed application technologies","author":"shands","year":"2000","journal-title":"Proceedings of the Network and Distributed System Security Symposium (NDSS)"},{"journal-title":"Negotiation and management of coalition resources","year":"2002","author":"khurana","key":"15"},{"journal-title":"Artificial Intelligence A Modern Approach","year":"1995","author":"russell","key":"16"},{"key":"13","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/3-540-44569-2_6","article-title":"Tower: A language for role based access control","volume":"1995","author":"hitchens","year":"0","journal-title":"Lecture Notes in Computer Science"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/0743-1066(94)90033-7"},{"key":"11","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/3-540-49481-2_16","article-title":"Compiling semiring-based constraints with cl pFDS","volume":"1520","author":"georget","year":"1998","journal-title":"Lecture Notes in Computer Science"},{"key":"12","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/3-540-45807-7_28","article-title":"On the negotiation of access control policies","volume":"2467","author":"gligor","year":"2002","journal-title":"Lecture Notes in Computer Science"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/256303.256306"},{"key":"20","article-title":"Automated trust negotiation","author":"winsborough","year":"2000","journal-title":"Proc DARPA Information Survivability Conference and Exposition (DISCEX)"},{"key":"2","article-title":"SCSPs for modelling attacks to security protocols","author":"bella","year":"2000","journal-title":"Principle and Practice of Constraint Programming-CP2000 Workshop on Soft Constraints"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/382912.382913"},{"journal-title":"Yan Georget's Web Page The Clp(FD S) Language","year":"0","author":"georget","key":"10"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44569-2_2"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/504909.504910"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/A:1026441215081"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/383721.383725"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(89)90037-4"},{"key":"8","first-page":"90","article-title":"On the expressiveness of networks with hidden variables","author":"dechter","year":"1990","journal-title":"Proc AAAI"}],"event":{"name":"POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks","acronym":"POLICY-03","location":"Lake Como, Italy"},"container-title":["Proceedings POLICY 2003. IEEE 4th International Workshop on Policies for Distributed Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8577\/27164\/01206965.pdf?arnumber=1206965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T00:04:43Z","timestamp":1497571483000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1206965\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/policy.2003.1206965","relation":{},"subject":[]}}