{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,6]],"date-time":"2025-02-06T05:25:46Z","timestamp":1738819546228,"version":"3.37.0"},"reference-count":13,"publisher":"Academy Publisher","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JMM"],"DOI":"10.4304\/jmm.9.4.548-552","type":"journal-article","created":{"date-parts":[[2014,4,8]],"date-time":"2014-04-08T11:14:17Z","timestamp":1396955657000},"source":"Crossref","is-referenced-by-count":1,"title":["Distributed Certificates Chain Searching Algorithms Based on Trustworthy"],"prefix":"10.4304","volume":"9","author":[{"given":"Jianyun","family":"Lei","sequence":"first","affiliation":[]},{"given":"Yanhong","family":"Li","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"ref1","volume-title":"\"Dynamic trust management \" IEEE Computer","author":"Blaze","year":"2009","unstructured":"[1] M. Blaze, S. Kannan, I. Lee, O. Sokolsky, J. M. Smith, A. D. Keromytis, and W. Lee, \"Dynamic trust management,\" IEEE Computer (Sp. Issue on Trust Mangement), 2009."},{"issue":"1","key":"ref2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","article-title":"Distributed credential chain discovery in trust management.","volume":"11","author":"Li","year":"2003","unstructured":"[2] Li N., Winsborough W H., Mitchell J C. Distributed credential chain discovery in trust management. Journal of Computer Security, 2003, 11(1): 35~86.","journal-title":"Journal of Computer Security"},{"key":"ref3","first-page":"159","volume-title":"Ziqing Mao etc","year":"2006","unstructured":"[5] Ziqing Mao, etc. Distributed Credential Chain Discovery in Trust Management with Parameterized Roles and Constraints, Lecture Notes in Computer science, 2006, pp. 159-173"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1141277.1141719"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1519144.1519149"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49135-X_9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/306549.306582"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029912"},{"key":"ref10","first-page":"3","article-title":"Valuation of Trust in Open Networks","volume-title":"Proceedings of the Third European Symposium on Research in Computer Security","author":"Beth","year":"1994","unstructured":"[24] T. Beth, M. Borcherding, and B. Klein, \"Valuation of Trust in Open Networks,\" Proceedings of the Third European Symposium on Research in Computer Security, Springer-Verlag London, UK, 1994, pp. 3-18."},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11859-008-0625-z"},{"issue":"8","key":"ref12","first-page":"1265","article-title":"Zhu Gengming etc. Trustworth based Authorization Delegation Model.","volume":"29","author":"Junguo","year":"2006","unstructured":"[26] Liao Junguo, Hong Fan, Zhu Gengming etc. Trustworth based Authorization Delegation Model. Chinese Journal of Computer, 2006, 29(8) pp. 1265~1270.","journal-title":"Chinese Journal of Computer"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194885"}],"container-title":["Journal of Multimedia"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T16:56:35Z","timestamp":1738774595000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jmm2\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":13,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,4,8]]}},"URL":"https:\/\/doi.org\/10.4304\/jmm.9.4.548-552","relation":{},"ISSN":["1796-2048"],"issn-type":[{"type":"print","value":"1796-2048"}],"subject":[],"published":{"date-parts":[[2014,4,8]]}}}