{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:38:13Z","timestamp":1729622293025,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/eurocon.2011.5929192","type":"proceedings-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T16:57:43Z","timestamp":1309280263000},"page":"1-4","source":"Crossref","is-referenced-by-count":0,"title":["Complexity of credential processing"],"prefix":"10.1109","author":[{"given":"K.","family":"Sacha","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","article-title":"Certificate chain discovery in SPKI\/SDSI","volume":"9","author":"clarke","year":"2001","journal-title":"J Computer Security"},{"key":"ref3","article-title":"The KeyNote Trust Management System Version 2","author":"blaze","year":"1999","journal-title":"RFC 2704"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14706-7_15"},{"key":"ref6","first-page":"201","article-title":"RT: A Role-Based Trust-Management Framework","author":"li","year":"2003","journal-title":"Proc 3rd DARPA Information Survivability Conf and Exposition"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"ref11"},{"key":"ref5","first-page":"114","article-title":"Design of a Role-Based Trust-Management Framework","author":"li","year":"2002","journal-title":"Proc IEEE Symposium on Security and Privacy"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1140335.1140361"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"35","DOI":"10.3233\/JCS-2003-11102","article-title":"Distributed Credential Chain Discovery in Trust Management","author":"li","year":"2003","journal-title":"J Computer Security"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref9","first-page":"195","article-title":"The Semantics of Role-Based Trust Management Languages","author":"felkner","year":"2009","journal-title":"Proc 4th IFIP Central and East European Conference on Software Engineering Techniques"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/2.485845"}],"event":{"name":"IEEE EUROCON 2011 - International Conference on Computer as a Tool","start":{"date-parts":[[2011,4,27]]},"location":"Lisbon","end":{"date-parts":[[2011,4,29]]}},"container-title":["2011 IEEE EUROCON - International Conference on Computer as a Tool"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5876183\/5929030\/05929192.pdf?arnumber=5929192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T09:39:15Z","timestamp":1560332355000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5929192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/eurocon.2011.5929192","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}