{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:50:09Z","timestamp":1725475809585},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540677420"},{"type":"electronic","value":"9783540450306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/10718964_2","type":"book-chapter","created":{"date-parts":[[2006,12,29]],"date-time":"2006-12-29T16:04:09Z","timestamp":1167408249000},"page":"18-29","source":"Crossref","is-referenced-by-count":1,"title":["Towards a New Authorisation Paradigm for Extranets"],"prefix":"10.1007","author":[{"given":"Richard","family":"Au","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mark","family":"Looi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paul","family":"Ashley","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5609-1","volume-title":"Practical Intranet Security: An Overview of the State of the Art and Available Technologies","author":"P. Ashley","year":"1999","unstructured":"Ashley, P., Vandenwauver, M.: Practical Intranet Security: An Overview of the State of the Art and Available Technologies. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Ashley, P., Vandenwauver, M., Siebenlist, F.: Applying Authorisation to Intranets: Architectures, Issues and APIs. Accepted to Computer Communications Journal 23, Elsevier Science (2000)","DOI":"10.1016\/S0140-3664(00)00247-4"},{"key":"2_CR3","unstructured":"American National Standard X9.57. Public Key Cryptography for the Financial Services Industry: Certificate Management (1997)"},{"key":"2_CR4","unstructured":"American National Standard X9.45. Enhanced Management Controls Using Digital Signatures and Attribute Certificates (1999)"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Au, R., Looi, M., Ashley, P.: Cross-Domain One-Shot Authorisation Using Smart Cards (2000) (unpublished)","DOI":"10.1145\/352600.352635"},{"key":"2_CR6","volume-title":"Extranets - Building the Business to Business Web","author":"D. Bayles","year":"1998","unstructured":"Bayles, D.: Extranets - Building the Business to Business Web. Prentice Hall PTR, Englewood Cliffs (1998)"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralised Trust Management. Proceedings of 1996 IEEE Symposium on Security and Privacy (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"2_CR8","unstructured":"Butler, J.G.: Securing the Enterprise Network. Computer Technology Research Corp. (1997)"},{"key":"2_CR9","unstructured":"Ellison, C.M.: SPKI Requirements, Available at http:\/\/www.ietf.org\/internt-drafts\/draft-ietf-spki-cert-req-01.txt on 6-8-99"},{"key":"2_CR10","volume-title":"OSF DCE - Guide to Developing Distributed Applications","author":"W. Harold","year":"1994","unstructured":"Harold, W., Lockhart Jr.: OSF DCE - Guide to Developing Distributed Applications. McGraw-Hill, New York (1994)"},{"key":"2_CR11","unstructured":"ISO 10181-3. Information Technology - Open System Interconnect \u2013 Security Framework in Open Systems : Access Control Framework, International Organisation for Standardisation (1996)"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, C.: The Kerberos Network Authentication Service V5. RFC1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/10721064_17","volume-title":"Smart Card. Research and Applications","author":"M. Looi","year":"2000","unstructured":"Looi, M., Ashley, P., Seet, L., Au, R., Vandenwauver, M.: Enhancing SE-SAMEV4 with Smart Cards. In: Schneier, B., Quisquater, J.-J. (eds.) CARDIS 1998. LNCS, vol.\u00a01820. Springer, Heidelberg (2000)"},{"key":"2_CR14","unstructured":"Nicomette, V., Deswarte, Y.: An Authorisation Scheme For Distributed Object Systems. In: Proceedings of Symposium on Security and Privacy IEEE (1997)"},{"key":"2_CR15","unstructured":"Rivest, R., Lampson, B.: SDSI - A Simple Distributed Security Infrastructure, Available at http:\/\/theory.lcs.mit.edu\/rivest\/sdsi11.html on 12-9-99"},{"key":"2_CR16","volume-title":"Understanding DCE","author":"W. Rosenberry","year":"1992","unstructured":"Rosenberry, W., Kenney, D., Fisher, G.: Understanding DCE. O\u2019Reilly & Associates, Inc., Sebastopol (1992)"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/10718964_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,23]],"date-time":"2019-04-23T07:42:10Z","timestamp":1556005330000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/10718964_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540677420","9783540450306"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/10718964_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2000]]}}}