{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:38:41Z","timestamp":1750307921620,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,20]],"date-time":"2007-03-20T00:00:00Z","timestamp":1174348800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,20]]},"DOI":"10.1145\/1229285.1229308","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T19:41:00Z","timestamp":1175802060000},"page":"149-160","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Trust management services in relational databases"],"prefix":"10.1145","author":[{"given":"Sabrina","family":"De Capitani di Vimercati","sequence":"first","affiliation":[{"name":"DTI - University of Milan, Crema - Italy"}]},{"given":"Sushil","family":"Jajodia","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, VA"}]},{"given":"Stefano","family":"Paraboschi","sequence":"additional","affiliation":[{"name":"DIGI - University of Bergamo, Dalmine - Italy"}]},{"given":"Pierangela","family":"Samarati","sequence":"additional","affiliation":[{"name":"DTI - University of Milan, Crema - Italy"}]}],"member":"320","published-online":{"date-parts":[[2007,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"S. Foresti, and P. Samarati. Trust management. In Security, Privacy and Trust in Modern Data Management","author":"Ardagna C.","year":"2006","unstructured":"C. Ardagna , E. Damiani , S. De Capitani di Vimercati , S. Foresti, and P. Samarati. Trust management. In Security, Privacy and Trust in Modern Data Management . Springer , 2006 . C. Ardagna, E. Damiani, S. De Capitani di Vimercati, S. Foresti, and P. Samarati. Trust management. In Security, Privacy and Trust in Modern Data Management. Springer, 2006."},{"key":"e_1_3_2_1_2_1","volume-title":"The KeyNote Trust Management System (Version 2), internet rfc 2704 edition","author":"Blaze M.","year":"1999","unstructured":"M. Blaze , J. Feigenbaum , J. Ioannidis , and A. Keromytis . The KeyNote Trust Management System (Version 2), internet rfc 2704 edition , 1999 . M. Blaze, J. Feigenbaum, J. Ioannidis, and A. Keromytis. The KeyNote Trust Management System (Version 2), internet rfc 2704 edition, 1999."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.5555\/525080.884248"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/603404.603407"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/275079.275092"},{"key":"e_1_3_2_1_6_1","first-page":"1999","article-title":"Foundation (SQL\/foundation). ISO International Standard","volume":"9075","author":"Database","year":"1999","unstructured":"Database language SQL - part 2 : Foundation (SQL\/foundation). ISO International Standard , ISO\/IEC 9075 : 1999 , 1999 . Database language SQL - part 2: Foundation (SQL\/foundation). ISO International Standard, ISO\/IEC 9075:1999, 1999.","journal-title":"ISO\/IEC"},{"key":"e_1_3_2_1_7_1","volume-title":"Security in Decentralized Data Management","author":"di Vimercati S. De Capitani","year":"2006","unstructured":"S. De Capitani di Vimercati , S. Foresti , S. Jajodia , and P. Samarati . Access control policies and languages in open environments . In Security in Decentralized Data Management . Springer , 2006 . S. De Capitani di Vimercati, S. Foresti, S. Jajodia, and P. Samarati. Access control policies and languages in open environments. In Security in Decentralized Data Management. Springer, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"September","author":"Ellison C.","year":"1999","unstructured":"C. Ellison , B. Frantz , B. Lampson , R. Rivest , B. Thomas , and T. Ylonen . SPKI certificate theory. RFC2693 , September 1999 . C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI certificate theory. RFC2693, September 1999."},{"key":"e_1_3_2_1_9_1","volume-title":"January","author":"Housley R.","year":"1999","unstructured":"R. Housley , W. Ford , W. Polk , and D. Solo . Internet X.509 Public Key Infrastructure Certificate and CRL Profile, rfc 2459 edition , January 1999 . http:\/\/www.ietf.org\/rfc\/rfc2459.txt. R. Housley, W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure Certificate and CRL Profile, rfc 2459 edition, January 1999. http:\/\/www.ietf.org\/rfc\/rfc2459.txt."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1102120.1102128"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1066100.1066103"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.5555\/773065.773067"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/1102120.1102129"},{"key":"e_1_3_2_1_14_1","volume-title":"Foundations of Security Analysis and Design, LNCS 2171","author":"Samarati P.","year":"2001","unstructured":"P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms . In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171 . Springer-Verlag , 2001 . P. Samarati and S. De Capitani di Vimercati. Access control: Policies, models, and mechanisms. In R. Focardi and R. Gorrieri, editors, Foundations of Security Analysis and Design, LNCS 2171. Springer-Verlag, 2001."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.1145\/1029133.1029140"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1007\/11593980_10"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.5555\/353686.353691"},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. of the IEEE Symposium on Security and Privacy","author":"Yu T.","year":"2003","unstructured":"T. Yu and M. Winslett . A unified scheme for resource protection in automated trust negotiation . In Proc. of the IEEE Symposium on Security and Privacy , Oakland, CA, USA , May 2003 . T. Yu and M. Winslett. A unified scheme for resource protection in automated trust negotiation. In Proc. of the IEEE Symposium on Security and Privacy, Oakland, CA, USA, May 2003."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/605434.605435"}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"Asia CCS07","name":"Asia CCS07: Asia CCS'07 ACM Symposium on Information, Computer and Communications Security","location":"Singapore"},"container-title":["Proceedings of the 2nd ACM symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229308","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1229285.1229308","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:36Z","timestamp":1750258296000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1229285.1229308"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3,20]]},"references-count":19,"alternative-id":["10.1145\/1229285.1229308","10.1145\/1229285"],"URL":"https:\/\/doi.org\/10.1145\/1229285.1229308","relation":{},"subject":[],"published":{"date-parts":[[2007,3,20]]},"assertion":[{"value":"2007-03-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}