{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:02:05Z","timestamp":1725559325763},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540280620"},{"type":"electronic","value":"9783540315858"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11533733_7","type":"book-chapter","created":{"date-parts":[[2005,11,13]],"date-time":"2005-11-13T05:02:48Z","timestamp":1131858168000},"page":"100-117","source":"Crossref","is-referenced-by-count":7,"title":["An Innovative Policy-Based Cross Certification Methodology for Public Key Infrastructures"],"prefix":"10.1007","author":[{"given":"Valentina","family":"Casola","sequence":"first","affiliation":[]},{"given":"Antonino","family":"Mazzeo","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Mazzocca","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Rak","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Brewer, D., Nash, M.: The Chinese Wall Security Policy. In: Proceedings of the 1989 IEEE Symposium on Security and Privacy, pp. 206\u2013214 (May 1989)","DOI":"10.1109\/SECPRI.1989.36295"},{"key":"7_CR2","unstructured":"Canfora, G., Troiano, L.: An Extensive Comparison between OWA and OFNWA Aggregation, VIII Sigef Congress, Naples - Italy (2001)"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1145\/568760.568880","volume-title":"SEKE 2002","author":"G. Canfora","year":"2002","unstructured":"Canfora, G., Troiano, L.: The Importance of Dealing with Uncertainty in the Evaluation of Software Engineering Methods and Tools. In: SEKE 2002, pp. 691\u2013698. ACM Press, Ischia (2002)"},{"key":"7_CR4","unstructured":"Canfora, G., Cerulo, L., Preziosi, R., Troiano, L.: A tool for Decision Support implementing OFNWA approach: A case study. In: SEKE 2003 (2003)"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Casola, V., Mazzeo, A., Mazzocca, N., Vittorini, V.: Policy Formalization to combine separate systems into larger connected networks of trust. In: Proceedings of Net-Con 2002 Conference, Paris, France (2002)","DOI":"10.1007\/978-0-387-35620-4_37"},{"key":"7_CR6","unstructured":"Casola, V., Mazzeo, A., Mazzocca, N., Vittorini, V.: Policy based interoperability in distributed security infrastructures. In: Proceedings of 10th ISPE International conference on concurrent engineering: research and applications, Madeira, Spain (2003)"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Casola, V., Preziosi, R., Rak, M., Troiano, L.: Security Level Evaluation: Policy and Fuzzy Technique. In: IEEE Proceedings of International Conference on Information Technology: Coding and Computing (ITCC 2004), Las Vegas, vol.\u00a02, pp. 752\u2013756 (2004) ISBN 0-7695-2108-8","DOI":"10.1109\/ITCC.2004.1286747"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Casola, V., Preziosi, R., Rak, M., Troiano, L.: A Reference Model for Security Level Evaluation: Policy and Fuzzy Techniques. In: JUCS - Journal of Universal Computer Science - edited by Ajith Abraham, Oklahoma State University, USA and L.C. Jain, University of South Australia (2005)","DOI":"10.1109\/ITCC.2004.1286747"},{"key":"7_CR9","unstructured":"Curry, I.: Trusted Public-Key Infrastructures, Version 1.2, Entrust Technologies (2000), http:\/\/www.entrust.com"},{"key":"7_CR10","unstructured":"EuroPKI, Certificate Policy VERSION 1.1 (DRAFT 4), OID: 1.3.6.1.4.1. 5255.1.1.1 (2000)"},{"key":"7_CR11","volume-title":"Secure Electronic Commerce","author":"M.S. Baum","year":"1997","unstructured":"Baum, M.S., Ford, W.: Secure Electronic Commerce. Prentice Hall, Englewood Cliffs (1997)"},{"key":"7_CR12","unstructured":"Grill, S.: An Approach to Formally Compare and Query Certification Practice Statements, Published on Informatik GI Workshop, Berlin (2000)"},{"key":"7_CR13","unstructured":"Huitema, C., Mendes, S.: A new approach to the X.509 framework: allowing a global authentication infrastructure without a global trust model. In: Proceedings of the 1995 Symposium on Network and Distributed System Security, SNDSS 1995 (1995)"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"1104","DOI":"10.1016\/S0140-3664(99)00082-1","volume":"22","author":"T. Klobucar","year":"1999","unstructured":"Klobucar, T., Jerman-Blazic, B.: A Formalization and evaluation of certificate policies. Computer Communication\u00a022, 1104\u20131110 (1999)","journal-title":"Computer Communication"},{"issue":"3","key":"7_CR15","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1016\/S0167-4048(00)88615-0","volume":"19","author":"S.A. Kokolakis","year":"2000","unstructured":"Kokolakis, S.A., Kiountouzis, E.A.: Achieving Interoperability in a multiple-security-policies environment. Computer & Security\u00a019(3), 267\u2013281 (2000)","journal-title":"Computer & Security"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S.: A Logical Language for Expressing Authorizations. In: Published in the proceedings of IEEE Symposium on Security and Privacy, Oakland, USA (1997)","DOI":"10.1109\/SECPRI.1997.601312"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Kagal, L., Finin, T., Joshi, A.: A Policy Language for a Pervasive Computing Environment. In: IEEE 4th International Workshop on Policies for Distributed Systems and Networks Policy (2003)","DOI":"10.1109\/POLICY.2003.1206958"},{"key":"7_CR18","unstructured":"NIST 2001, Report of Federal Bridge Certification Authority Initiative and Demonstration"},{"key":"7_CR19","unstructured":"Polk, W., Hastings, N.: Bridge Certification Authorities: Connecting B2B Public Key Infrastructures (2000)"},{"key":"7_CR20","unstructured":"RFC2459 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile (1999)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Chokhani, S., Ford, W.: RFC 3647: Internet X.509 Public Key Infrastructure Certificate Policy and Certification Practices Framework (1999)","DOI":"10.17487\/rfc2527"},{"key":"7_CR22","unstructured":"Turnbull, J.: Cross-Certification and PKI Policy Networking Version 1.1, Entrust Technologies (2000), http:\/\/www.entrust.com"},{"key":"7_CR23","unstructured":"Digital Signature and Confidentiality, Certificate Policies for the Government of Canada Public Key Infrastructure, version 3.02 (1999)"},{"key":"7_CR24","unstructured":"Centro Tecnico per la Rete Unitaria, Sezione Sicurezza, Manuale operativo per il servizio di certificazione di chiavi pubbliche per la rete unitaria della pubblica amministrazione. Versione 1.1 (2001)"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11533733_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:09:36Z","timestamp":1605643776000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11533733_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540280620","9783540315858"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/11533733_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}