{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:20:16Z","timestamp":1729657216267,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,11]]},"DOI":"10.1109\/pcthealth.2006.361626","type":"proceedings-article","created":{"date-parts":[[2007,6,7]],"date-time":"2007-06-07T15:55:01Z","timestamp":1181231701000},"page":"1-9","source":"Crossref","is-referenced-by-count":12,"title":["Privacy Preserving Trust Negotiation for Pervasive Healthcare"],"prefix":"10.1109","author":[{"given":"Changyu","family":"Dong","sequence":"first","affiliation":[]},{"given":"Naranker","family":"Dulay","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-36467-6_10","article-title":"Protecting privacy during on-line trust negotiation","volume":"2482","author":"seamons","year":"2002","journal-title":"Privacy Enhancing Technologies"},{"key":"ref11","article-title":"RFC3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","author":"housley","year":"2002","journal-title":"IETF RFC Publication"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/586111.586114"},{"key":"ref13","first-page":"93","article-title":"An efficient system for nontransferable anonymous credentials with optional anonymity revocation","volume":"2045","author":"camenisch","year":"2001","journal-title":"Eurocrypt"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11423409_18"},{"key":"ref15","first-page":"301","article-title":"Oacerts: Oblivious attribute certificates","volume":"3531","author":"li","year":"2005","journal-title":"ACNS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0055745"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1005140.1005142"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/1030083.1030104","article-title":"Concealing complex policies with hidden credentials","author":"bradshaw","year":"2004","journal-title":"CCS '04 Proceedings of the 11th ACM Conference on Computer and Communications Security"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872061"},{"key":"ref4","first-page":"114","article-title":"Design of a role-based trust-management framework","author":"li","year":"2002","journal-title":"SP '02 Proceedings of the 2002 IEEE Symposium on Security and Privacy"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2000.848442"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/544805.544809"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/POLICY.2002.1011297"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1145\/1102120.1102129","article-title":"Automated trust negotiation using cryptographic credentials","author":"li","year":"2005","journal-title":"CCS '05 Proceedings of the 12th ACM conference on Computer and communications security"},{"key":"ref2","first-page":"59","article-title":"Keynote: Trust management for public-key infrastructures (position paper)","author":"blaze","year":"1999","journal-title":"Proceedings of the 6th International Workshop on Security Protocols"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2000.824965"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1067734"},{"key":"ref22","article-title":"Advanced client\/server authentication in tls","author":"hess","year":"2002","journal-title":"NDSS"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2003.1194912"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318565"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2004.1301321"}],"event":{"name":"2006 Pervasive Health Conference and Workshops","start":{"date-parts":[[2006,11,29]]},"location":"Innsbruck, Austria","end":{"date-parts":[[2006,12,1]]}},"container-title":["2006 Pervasive Health Conference and Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4205139\/4205140\/04205196.pdf?arnumber=4205196","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T14:28:48Z","timestamp":1497709728000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4205196\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,11]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/pcthealth.2006.361626","relation":{},"subject":[],"published":{"date-parts":[[2006,11]]}}}