{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:02:28Z","timestamp":1725530548041},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642014642"},{"type":"electronic","value":"9783642014659"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01465-9_20","type":"book-chapter","created":{"date-parts":[[2009,4,4]],"date-time":"2009-04-04T00:56:06Z","timestamp":1238806566000},"page":"302-315","source":"Crossref","is-referenced-by-count":1,"title":["Delegating Privileges over Finite Resources: A Quota Based Delegation Approach"],"prefix":"10.1007","author":[{"given":"Isaac","family":"Agudo","sequence":"first","affiliation":[]},{"given":"Carmen","family":"Fernandez-Gago","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Lopez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/11429760_9","volume-title":"Trust Management","author":"I. Agudo","year":"2005","unstructured":"Agudo, I., Lopez, J., Montenegro, J.A.: A representation model of trust relationships with delegation extensions. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 116\u2013130. Springer, Heidelberg (2005)"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust Management for Public-Key Infrastructures (position paper). In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 59\u201363. Springer, Heidelberg (1999)"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: IEEE Symposium on Security and Privacy (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"Ellison, C.: SPKI Certificate Theory, Request for Comments 2693. IETF SPKI Working Group (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. IETF PKIX Working Group, Request for Comments 3281 (April 2002)","DOI":"10.17487\/rfc3281"},{"key":"20_CR6","unstructured":"Haber, S., Horne, W., Sander, T., Yao, D.: Privacy-preserving verification of aggregate queries on outsourced databases. Technical report, Trusted Systems Laboratory, HP Laboratories Palo Alto (2007)"},{"key":"20_CR7","unstructured":"ITU-T Recommendation X.509. ITU-T X.509, ISI\/IEC 9594-8, Information technology - Open Systems Interconnection - The Directory: Public-key and attribute certificate frameworks (August 2005)"},{"key":"20_CR8","unstructured":"Kemeny, J.G.: Finite Markov Chains. New York (1976)"},{"key":"20_CR9","unstructured":"Leiven, R.: Attack Resistant Trust Metrics. PhD thesis, University of California, Berkeley (2003)"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-540-25980-0_13","volume-title":"Public Key Infrastructure","author":"J. Montenegro","year":"2004","unstructured":"Montenegro, J., Moya, F.: A practical approach of X.509 attribute certificate framework as support to obtain privilege delegation. In: Katsikas, S.K., Gritzalis, S., L\u00f3pez, J. (eds.) EuroPKI 2004. LNCS, vol.\u00a03093, pp. 160\u2013172. Springer, Heidelberg (2004)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1007\/11733836_30","volume-title":"Database Systems for Advanced Applications","author":"M. Narasimha","year":"2006","unstructured":"Narasimha, M., Tsudik, G.: Authentication of outsourced databases using signature aggregation and chaining. In: Li Lee, M., Tan, K.-L., Wuwongse, V. (eds.) DASFAA 2006. LNCS, vol.\u00a03882, pp. 420\u2013436. Springer, Heidelberg (2006)"},{"key":"20_CR12","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)"},{"key":"20_CR13","unstructured":"Papoullis, A.: Brownian Movement and Markoff Processes. In: Papoullis, A. (ed.) Probability, Random Variables and Stochastic Processes, New York, pp. 515\u2013553 (1984)"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Ziegler, C.N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: IEEE International Conference on e-Technology, e-Commerce, and e-Service (EEE 2004), Taipei (March 2004)","DOI":"10.1109\/EEE.2004.1287293"},{"issue":"4-5","key":"20_CR15","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","volume":"7","author":"C.-N. Ziegler","year":"2005","unstructured":"Ziegler, C.-N., Lausen, G.: Propagation Models for Trust and Distrust in Social Networks. Information Systems Frontiers\u00a07(4-5), 337\u2013358 (2005)","journal-title":"Information Systems Frontiers"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01465-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T05:32:09Z","timestamp":1558243929000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01465-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642014642","9783642014659"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01465-9_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}