{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T15:41:15Z","timestamp":1648568475485},"reference-count":26,"publisher":"Elsevier BV","issue":"7","license":[{"start":{"date-parts":[[2009,10,1]],"date-time":"2009-10-01T00:00:00Z","timestamp":1254355200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers & Security"],"published-print":{"date-parts":[[2009,10]]},"DOI":"10.1016\/j.cose.2009.03.004","type":"journal-article","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T05:26:46Z","timestamp":1238045206000},"page":"557-565","source":"Crossref","is-referenced-by-count":9,"title":["DFANS: A highly efficient strategy for automated trust negotiation"],"prefix":"10.1016","volume":"28","author":[{"given":"Hongwei","family":"Lu","sequence":"first","affiliation":[]},{"given":"Bailing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"6","key":"10.1016\/j.cose.2009.03.004_bib21","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1109\/TC.1978.1675141","article-title":"Binary decision diagrams","volume":"C-27","author":"Akers","year":"1978","journal-title":"IEEE Transactions on Computers"},{"issue":"8","key":"10.1016\/j.cose.2009.03.004_bib18","doi-asserted-by":"crossref","first-page":"677","DOI":"10.1109\/TC.1986.1676819","article-title":"Graph-based algorithms for Boolean function manipulation","volume":"C-35","author":"Bryant","year":"1986","journal-title":"IEEE Transactions on Computers"},{"issue":"3","key":"10.1016\/j.cose.2009.03.004_bib13","doi-asserted-by":"crossref","first-page":"428","DOI":"10.1145\/1015040.1015044","article-title":"Content-triggered trust negotiation","volume":"7","author":"Hess","year":"2004","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/j.cose.2009.03.004_bib6","unstructured":"Hess A, Jacobson J, Mills H, Wamsley R, Seamons KE, Smith B. Advanced client\/server authentication in TLS. In: Network and distributed system security symposium; February 2002. p. 203\u201314."},{"key":"10.1016\/j.cose.2009.03.004_bib15","doi-asserted-by":"crossref","unstructured":"Holt JE, Bradshaw RW, Seamons KE, Orman H. Hidden credentials. In: Proceedings of the 2nd ACM workshop on privacy in the electronic society; October 2003.","DOI":"10.1145\/1005140.1005142"},{"key":"10.1016\/j.cose.2009.03.004_bib26","doi-asserted-by":"crossref","unstructured":"Irwin K, Yu T. Preventing attribute information leakage in automated trust negotiation. In: ACM conference on computer and communications security (CCS), Alexandria, VA; November 2005.","DOI":"10.1145\/1102120.1102128"},{"key":"10.1016\/j.cose.2009.03.004_bib19","doi-asserted-by":"crossref","unstructured":"Kapadia A, Sampemane G, Campbell RH. Know why your access was denied: regulating feedback for usable security. In: ACM conference on computer and communication security, Washington, DC, USA; October 2004.","DOI":"10.1145\/1030083.1030092"},{"key":"10.1016\/j.cose.2009.03.004_bib20","doi-asserted-by":"crossref","first-page":"985","DOI":"10.1002\/j.1538-7305.1959.tb01585.x","article-title":"Representation of switching circuits by binary-decision programs","volume":"38","author":"Lee","year":"1959","journal-title":"Bell System Technical Journal"},{"key":"10.1016\/j.cose.2009.03.004_bib22","doi-asserted-by":"crossref","unstructured":"Li N, Du W, Boneh D. Oblivious signature-based envelope. In: Proceedings of the 22nd ACM symposium on principles of distributed computing (PODC); July 2003.","DOI":"10.1145\/872035.872061"},{"key":"10.1016\/j.cose.2009.03.004_bib5","doi-asserted-by":"crossref","unstructured":"Li J, Li N, Winsborough WH. Automated trust negotiation using cryptographic credentials. In: Proceedings of the 12th ACM conference on computer and communications security; November 2005.","DOI":"10.1145\/1102120.1102129"},{"key":"10.1016\/j.cose.2009.03.004_bib24","unstructured":"Liu Z, Xiu D. Agent-based automated trust negotiation for pervasive computing. In: Proceedings of the second international conference on embedded software and systems (ICESS); 2005."},{"key":"10.1016\/j.cose.2009.03.004_bib14","doi-asserted-by":"crossref","unstructured":"Lu H, Liu B. Improving negotiation efficiency and success in automated trust negotiation. In: The international conference on signal image technology & internet based systems (SITIS); December 2007. p. 412\u20139.","DOI":"10.1109\/SITIS.2007.27"},{"key":"10.1016\/j.cose.2009.03.004_bib23","doi-asserted-by":"crossref","unstructured":"Nejdl W, Olmedilla D, Winslett M. PeerTrust: automated trust negotiation for peers on the semantic web. In: Proceedings of the workshop on secure data management in a connected world (SDM '04) in conjunction with 30th international conference on very large databases; August\/September 2004.","DOI":"10.1007\/978-3-540-30073-1_9"},{"key":"10.1016\/j.cose.2009.03.004_bib1","unstructured":"Seamons KE, Winslett M, Yu T. Limiting the disclosure of access control policies during automated trust negotiation. In: The symposium on network and distributed system security; February 2001."},{"key":"10.1016\/j.cose.2009.03.004_bib7","series-title":"Second workshop on privacy enhancing technologies","article-title":"Protecting privacy during on-line trust negotiation","author":"Seamons","year":"2002"},{"key":"10.1016\/j.cose.2009.03.004_bib17","series-title":"Formal concepts in artificial intelligence","author":"Shinghal","year":"1992"},{"key":"10.1016\/j.cose.2009.03.004_bib16","unstructured":"Winsborough W, Seamons K, Jones V. Automated trust negotiation. In: DARPA information survivability conference and exposition, Hilton Head, SC; January 2000."},{"key":"10.1016\/j.cose.2009.03.004_bib2","series-title":"Policy 2002","first-page":"92","article-title":"Towards practical automated trust negotiation","author":"Winsborough","year":"2002"},{"key":"10.1016\/j.cose.2009.03.004_bib8","series-title":"Proceedings of the ACM workshop on privacy in the electronic society","first-page":"41","article-title":"Protecting sensitive attributes in automated trust negotiation","author":"Winsborough","year":"2002"},{"key":"10.1016\/j.cose.2009.03.004_bib9","unstructured":"Winsborough WH, Li N. Safety in automated trust negotiation. In: Proceedings of the IEEE symposium on security and privacy; May 2004. p. 147\u201360."},{"issue":"6","key":"10.1016\/j.cose.2009.03.004_bib3","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MIC.2002.1067734","article-title":"Negotiating trust on the web","volume":"6","author":"Winslett","year":"2002","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/j.cose.2009.03.004_bib10","series-title":"Proceedings of IEEE symposium on security and privacy","first-page":"110","article-title":"A unified scheme for resource protection in automated trust negotiation","author":"Yu","year":"2003"},{"key":"10.1016\/j.cose.2009.03.004_bib11","doi-asserted-by":"crossref","unstructured":"Yu T, Ma X, Winslett M. PRUNES: an efficient and complete strategy for automated trust negotiation over the internet. In: ACM conference on computer and communication security, Athens, Greece; November 2000.","DOI":"10.1145\/352600.352633"},{"key":"10.1016\/j.cose.2009.03.004_bib12","doi-asserted-by":"crossref","unstructured":"Yu T, Winslett M, Seamons K. Interoperable strategies in automated trust negotiation. In: ACM conference on computer and communication security, Philadelphia, PA; November 2001.","DOI":"10.1145\/502001.502004"},{"issue":"1","key":"10.1016\/j.cose.2009.03.004_bib4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/605434.605435","article-title":"Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation","volume":"6","author":"Yu","year":"2003","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"10.1016\/j.cose.2009.03.004_bib25","doi-asserted-by":"crossref","unstructured":"Yu T, Winslett M. Policy migration for sensitive credentials in trust negotiation. In: ACM workshop on privacy in the electronic society (WPES), Washington, DC; October 2003b.","DOI":"10.1145\/1005140.1005143"}],"container-title":["Computers & Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000169?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404809000169?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T23:04:52Z","timestamp":1558220692000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404809000169"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10]]},"references-count":26,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2009,10]]}},"alternative-id":["S0167404809000169"],"URL":"https:\/\/doi.org\/10.1016\/j.cose.2009.03.004","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2009,10]]}}}