{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:43:23Z","timestamp":1750308203779,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,25]],"date-time":"2004-10-25T00:00:00Z","timestamp":1098662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,25]]},"DOI":"10.1145\/1030083.1030104","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"146-157","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":84,"title":["Concealing complex policies with hidden credentials"],"prefix":"10.1145","author":[{"given":"Robert W.","family":"Bradshaw","sequence":"first","affiliation":[{"name":"Brigham Young University"}]},{"given":"Jason E.","family":"Holt","sequence":"additional","affiliation":[{"name":"Brigham Young University"}]},{"given":"Kent E.","family":"Seamons","sequence":"additional","affiliation":[{"name":"Brigham Young University"}]}],"member":"320","published-online":{"date-parts":[[2004,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830565"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/647096.716997"},{"key":"e_1_3_2_1_3_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/0-387-34799-2_3","volume-title":"Advances in Cryptology - CRYPTO '88","author":"Benaloh J. C.","year":"1990","unstructured":"J. C. Benaloh and J. Leichter . Generalized secret sharing and monotone functions . In S. Goldwasser, editor, Advances in Cryptology - CRYPTO '88 , volume 403 of Lecture Notes in Computer Science , pages 27 -- 35 . Springer , 1990 .]] J. C. Benaloh and J. Leichter. Generalized secret sharing and monotone functions. In S. Goldwasser, editor, Advances in Cryptology - CRYPTO '88, volume 403 of Lecture Notes in Computer Science, pages 27--35. Springer, 1990.]]"},{"key":"e_1_3_2_1_4_1","first-page":"81","volume-title":"Fourth IEEE International Workshop on Policies for Distributed Systems and Networks","author":"Bertino E.","year":"2003","unstructured":"E. Bertino , E. Ferrari , and A. Squicciarini . \u03c7-TNL: An XML-based language for trust negotiation . In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks , pages 81 -- 84 , Como, Italy , June 2003 . IEEE Computer Society Press.]] E. Bertino, E. Ferrari, and A. Squicciarini. \u03c7-TNL: An XML-based language for trust negotiation. In Fourth IEEE International Workshop on Policies for Distributed Systems and Networks, pages 81--84, Como, Italy, June 2003. IEEE Computer Society Press.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/352600.352620"},{"key":"e_1_3_2_1_6_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Proceedings of Crypto","author":"Boneh D.","year":"2001","unstructured":"D. Boneh and M. Franklin . Identity-based encryption from the Weil pairing . In Proceedings of Crypto 2001 , volume 2139 of Lecture Notes in Computer Science , pages 213 -- 229 . Springer , 2001.]] D. Boneh and M. Franklin. Identity-based encryption from the Weil pairing. In Proceedings of Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 213--229. Springer, 2001.]]"},{"key":"e_1_3_2_1_7_1","series-title":"Lecture Notes in Computer Science, 1666: 537--554","volume-title":"Secure integration of asymmetric and symmetric encryption schemes","author":"Fujisaki E.","year":"1999","unstructured":"E. Fujisaki and T. Okamoto . Secure integration of asymmetric and symmetric encryption schemes . Lecture Notes in Computer Science, 1666: 537--554 , 1999 .]] E. Fujisaki and T. Okamoto. Secure integration of asymmetric and symmetric encryption schemes. Lecture Notes in Computer Science, 1666:537--554, 1999.]]"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872061"},{"key":"e_1_3_2_1_10_1","first-page":"109","volume-title":"Network and Distributed System Security Symposium","author":"Seamons K. E.","year":"2001","unstructured":"K. E. Seamons , M. Winslett , and T. Yu . Limiting the disclosure of access control policies during automated trust negotiation . In Network and Distributed System Security Symposium , pages 109 -- 124 , San Diego, CA , Feb. 2001 .]] K. E. Seamons, M. Winslett, and T. Yu. Limiting the disclosure of access control policies during automated trust negotiation. In Network and Distributed System Security Symposium, pages 109--124, San Diego, CA, Feb. 2001.]]"},{"key":"e_1_3_2_1_11_1","first-page":"88","volume-title":"DARPA Information Survivability Conference and Exposition","author":"Winsborough W. H.","year":"2000","unstructured":"W. H. Winsborough , K. E. Seamons , and V. E. Jones . Automated trust negotiation . In DARPA Information Survivability Conference and Exposition , volume I , pages 88 -- 102 , Hilton Head, SC , Jan. 2000 . IEEE Press.]] W. H. Winsborough, K. E. Seamons, and V. E. Jones. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, volume I, pages 88--102, Hilton Head, SC, Jan. 2000. IEEE Press.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"e_1_3_2_1_13_1","volume-title":"IEEE Symposium on Security and Privacy","author":"Yu T.","year":"2003","unstructured":"T. Yu and M. Winslett . A Unified Scheme for Resource Protection in Automated Trust Negotiation . In IEEE Symposium on Security and Privacy , Oakland, CA , May 2003 .]] T. Yu and M. Winslett. A Unified Scheme for Resource Protection in Automated Trust Negotiation. In IEEE Symposium on Security and Privacy, Oakland, CA, May 2003.]]"}],"event":{"name":"CCS04: 11th ACM Conference on Computer and Communications Security 2004","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Washington DC USA","acronym":"CCS04"},"container-title":["Proceedings of the 11th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1030083.1030104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:25:07Z","timestamp":1750263907000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1030083.1030104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,25]]},"references-count":13,"alternative-id":["10.1145\/1030083.1030104","10.1145\/1030083"],"URL":"https:\/\/doi.org\/10.1145\/1030083.1030104","relation":{},"subject":[],"published":{"date-parts":[[2004,10,25]]},"assertion":[{"value":"2004-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}