{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:40:29Z","timestamp":1738777229206,"version":"3.37.0"},"reference-count":18,"publisher":"Academy Publisher","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JNW"],"DOI":"10.4304\/jnw.9.4.927-931","type":"journal-article","created":{"date-parts":[[2014,4,1]],"date-time":"2014-04-01T12:49:14Z","timestamp":1396356554000},"source":"Crossref","is-referenced-by-count":0,"title":["Vector-Based Sensitive Information Protecting Scheme in Automatic Trust Negotiation"],"prefix":"10.4304","volume":"9","author":[{"given":"Jianyun","family":"Lei","sequence":"first","affiliation":[]},{"given":"Yanhong","family":"Li","sequence":"additional","affiliation":[]}],"member":"2838","published-online":{"date-parts":[[2014,4,1]]},"reference":[{"key":"ref1","volume-title":"\"How the semantic web is being used","author":"Ding","year":"2005","unstructured":"[2] L. Ding, L. Zhou, T. W. Finin, and A. Joshi, \"How the semantic web is being used: An analysis of foaf documents,\" in HICSS. IEEE Computer Society, 2005."},{"volume-title":"\"Privacy-aware Access Control in Social Networks","author":"Carminati","key":"ref2","unstructured":"[3] B. Carminati and E. Ferrari, \"Privacy-aware Access Control in Social Networks: Issues and Solutions,\" in Privacy and Anonymity in Information Management Systems, J. Nin and J. Herranz, Eds. Springer, to appear."},{"key":"ref3","article-title":"X-TNL: An XML Language for Trust Negotiations","volume-title":"4th IEEE Workshop on Policies for Distributed Systems and Networks","author":"Ferrari","year":"2003","unstructured":"[6] E. Ferrari, A. C. Squicciarini, and E. Bertino, \"X-TNL: An XML Language for Trust Negotiations,\" 4th IEEE Workshop on Policies for Distributed Systems and Networks, Como, Italy, June 2003."},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30073-1_9","article-title":"PeerTrust: Automated Trust Negotiation for Peers on the semantic web","volume-title":"Workshop on Secure Data Management in a Connected World (SDM 04)","author":"Nejdl","year":"2004","unstructured":"[7] W. Nejdl, D. Olmedilla, and M. Winslett, \"PeerTrust: Automated Trust Negotiation for Peers on the semantic web,\" in Workshop on Secure Data Management in a Connected World (SDM'04), Toronto, Canada, Aug. 2004."},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1609956.1609962"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/b10373"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2009.40"},{"key":"ref8","article-title":"Protecting privacy during on line trust negotiation","volume-title":"2nd Workshop on Privacy Enhancing Technologies","author":"Seamons","year":"2002","unstructured":"[11] T. Y. K. E. Seamons, M. Winslett, \"Protecting privacy during on line trust negotiation,\" in 2nd Workshop on Privacy Enhancing Technologies, San Francisco, CA, April 2002."},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36388-2_6"},{"key":"ref10","article-title":"Privacy-Preserving Trust Negotiation.","volume-title":"Proceedings of 4th Privacy Enhancing Technologies Workshop","author":"Bertino","year":"2004","unstructured":"[15] E. Bertino, E. Ferrari, and A. C. Squicciarini, \"Privacy-Preserving Trust Negotiation.\" Proceedings of 4th Privacy Enhancing Technologies Workshop, Toronto, CA, May 2004."},{"key":"ref11","first-page":"57","volume-title":"\"Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations \" in ICDCS","author":"Squicciarini","year":"2007","unstructured":"[16] A. C. Squicciarini, A. Trombetta, and E. Bertino, \"Supporting Robust and Secure Interactions in Open Domains through Recovery of Trust Negotiations,\" in ICDCS. IEEE Computer Society, 2007, p. 57."},{"key":"ref12","first-page":"97","volume-title":"\"Identitybased long running negotiations \" in Digital Identity Management","author":"Squicciarini","year":"2008","unstructured":"[17] A. C. Squicciarini, A. Trombetta, E. Bertino, and S. Braghin, \"Identitybased long running negotiations,\" in Digital Identity Management, E. Bertino and K. Takahashi, Eds. ACM, 2008, pp. 97\u2013106."},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1504\/IJCIS.2010.033338"},{"key":"ref14","first-page":"293","volume-title":"10th International Conference on the Theory and Application of Cryptology and Information Security","volume":"3329","author":"Castelluccia","year":"2004","unstructured":"[22] C. Castelluccia, S. Jarecki, G. Tsudik. Secret Handshakes from Ca-oblivious Encryption. In Advances in Cryptology \u2013 ASIACRPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security. Volume 3329 of Lecture Notes in Computer Science, Springer, 2004, 293-307."},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"ref16","first-page":"80","article-title":"Secret Handshakes from Pairing-Based Key Agreements.","volume-title":"Proceedings of the 2003 IEEE Symposium on Secret and Privacy","author":"Balfanz","year":"2003","unstructured":"[25] Balfanz D, Durfee G, Shankar N, et al. Secret Handshakes from Pairing-Based Key Agreements. Proceedings of the 2003 IEEE Symposium on Secret and Privacy. Oakland CA, 2003, 80-196."},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/605434.605435"},{"issue":"6","key":"ref18","first-page":"20","article-title":"Keeping confidentiality of sensitive attributes in credential during trust negotiation.","volume":"29","author":"Liao","year":"2008","unstructured":"[27] Junguo Liao, Fan Hong, Jun Li et al. Keeping confidentiality of sensitive attributes in credential during trust negotiation. Chinese Journal of Communications. 2008, 29(6) pp. 20-25.","journal-title":"Chinese Journal of Communications"}],"container-title":["Journal of Networks"],"original-title":[],"deposited":{"date-parts":[[2025,2,5]],"date-time":"2025-02-05T17:05:40Z","timestamp":1738775140000},"score":1,"resource":{"primary":{"URL":"https:\/\/dblp.org\/db\/journals\/jnw\/index.html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,1]]},"references-count":18,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2014,4,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jnw.9.4.927-931","relation":{},"ISSN":["1796-2056"],"issn-type":[{"type":"print","value":"1796-2056"}],"subject":[],"published":{"date-parts":[[2014,4,1]]}}}