{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,9]],"date-time":"2026-05-09T04:29:36Z","timestamp":1778300976384,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1145\/1063979.1064004","type":"proceedings-article","created":{"date-parts":[[2005,8,3]],"date-time":"2005-08-03T08:31:47Z","timestamp":1123057907000},"page":"139-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Adaptive trust negotiation and access control"],"prefix":"10.1145","author":[{"given":"Tatyana","family":"Ryutov","sequence":"first","affiliation":[{"name":"University of Southern California, Marina del Rey, CA"}]},{"given":"Li","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Southern California, Marina del Rey, CA"}]},{"given":"Clifford","family":"Neuman","sequence":"additional","affiliation":[{"name":"University of Southern California, Marina del Rey, CA"}]},{"given":"Travis","family":"Leithead","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Kent E.","family":"Seamons","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2005,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/998684.1006922"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318565"},{"key":"e_1_3_2_1_3_1","first-page":"3","volume":"10","author":"Bonatti P.","year":"2002","unstructured":"Bonatti , P. and Samarati , P. A Unified Framework for Regulating Access and Information Release on the Web. In Journal of Computer Security , 10 , 3 , ( 2002 ), 241--271. Bonatti, P. and Samarati, P. A Unified Framework for Regulating Access and Information Release on the Web. In Journal of Computer Security, 10, 3, (2002), 241--271.","journal-title":"A Unified Framework for Regulating Access and Information Release on the Web. In Journal of Computer Security"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/882494.884417"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884431"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III)","author":"Li N.","year":"2003","unstructured":"Li , N. , Mitchell , J. , and Winsborough , W . RT: A role-based trust-management framework . In Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III) , April 2003 . Li, N., Mitchell, J., and Winsborough, W. RT: A role-based trust-management framework. In Proceedings of The Third DARPA Information Survivability Conference and Exposition (DISCEX III), April 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30073-1_9"},{"key":"e_1_3_2_1_8_1","volume-title":"The Specification and Enforcement of Advanced Security Policies. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002","author":"Ryutov T.","year":"2002","unstructured":"Ryutov , T. and Neuman , C . The Specification and Enforcement of Advanced Security Policies. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002 ), Monterey, CA , June 2002 . Ryutov, T. and Neuman, C. The Specification and Enforcement of Advanced Security Policies. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, June 2002."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194872"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2003.1233707"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250583"},{"key":"e_1_3_2_1_12_1","volume-title":"Towards Practical Automated Trust Negotiation. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002","author":"Winsborough W.","year":"2002","unstructured":"Winsborough , W. and Li , N . Towards Practical Automated Trust Negotiation. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002 ), Monterey, CA , June 2002 . Winsborough, W. and Li, N. Towards Practical Automated Trust Negotiation. In Third International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), Monterey, CA, June 2002."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1109\/DISCEX.2000.824965","volume-title":"DARPA Information Survivability Conference and Exposition","volume":"1","author":"Winsborough W.H.","year":"2000","unstructured":"Winsborough , W.H. , Seamons , K.E. , and Jones , V.E . Automated trust negotiation . In DARPA Information Survivability Conference and Exposition , Volume 1 , Hilton Head, SC , 2000 , 88 - 102 . Winsborough, W.H., Seamons, K.E., and Jones, V.E. Automated trust negotiation. In DARPA Information Survivability Conference and Exposition, Volume 1, Hilton Head, SC, 2000, 88-102."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"}],"event":{"name":"SACMAT05: 10th ACM Symposium on Access Control Models and Technologies 2005","location":"Stockholm Sweden","acronym":"SACMAT05","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the tenth ACM symposium on Access control models and technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1064004","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1063979.1064004","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:19:12Z","timestamp":1750263552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1063979.1064004"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":14,"alternative-id":["10.1145\/1063979.1064004","10.1145\/1063979"],"URL":"https:\/\/doi.org\/10.1145\/1063979.1064004","relation":{},"subject":[],"published":{"date-parts":[[2005,6]]},"assertion":[{"value":"2005-06-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}