{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:26Z","timestamp":1725549326151},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_16","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"119-130","source":"Crossref","is-referenced-by-count":1,"title":["Enforcing Security Policies for Distributed Objects Applications"],"prefix":"10.1007","author":[{"given":"Bogdan C.","family":"Popescu","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Crispo","sequence":"additional","affiliation":[]},{"given":"Andrew S.","family":"Tanenbaum","sequence":"additional","affiliation":[]},{"given":"Maas","family":"Zeeman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"The Common Object Request Broker: Architecture and Specification. Document Formal (October 2000), http:\/\/www.omg.org"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J., Keromytis, A.D.: The KeyNote Trust-Management System, RFC 2704\u00a02 (September 1999)","DOI":"10.17487\/rfc2704"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Callas, J., Donnerhacke, L., Finney, H., Thayer, R.: OpenPGP Message Format. RFC 2440 (November 1998)","DOI":"10.17487\/rfc2440"},{"key":"16_CR4","volume-title":"Inside Distibuted COM.","author":"G. Eddon","year":"1998","unstructured":"Eddon, G., Eddon, H.: Inside Distibuted COM. Microsoft Press, Redmond (1998)"},{"key":"16_CR5","volume-title":"Fifth IEEE Int\u2019l Symp. on High Performance Distr. Computing","author":"A.S. Grimsaw","year":"1996","unstructured":"Grimsaw, A.S., Wulf, W.: Legion - a view from 50000 feet. In: Fifth IEEE Int\u2019l Symp. on High Performance Distr. Computing, August 1996. IEEE Computer Society Press, Los Alamitos (1996)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Kudo, M., Hada, S.: XML Document Security based on Provisional Authorization. In: Proc. 7th ACM Conf. on Comp. and Comm. Security (November 2000)","DOI":"10.1145\/352600.352613"},{"key":"16_CR7","unstructured":"Li, N., Mitchell, J.C., Winsborough, W.H.: Design of a Role-based Trust Management Framework. In: Proc. IEEE Symp. on Security and Privacy, Oakland (May 2002)"},{"issue":"2","key":"16_CR8","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-Based Access Control Models. IEEE Computer\u00a029(2), 38\u201348 (1996)","journal-title":"IEEE Computer"},{"key":"16_CR9","unstructured":"Union, I.T.: Open Systems Interconnection - The Directory: Public-Key and Attribute Certificate Frameworks (March 2000)"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"van Steen, M., Hauck, F.J., Homburg, P., Tanenbaum, A.S.: Locating Objects in Wide-Area Systems. IEEE Communications, 104\u2013109 (January 1998)","DOI":"10.1109\/35.649334"},{"key":"16_CR11","doi-asserted-by":"crossref","unstructured":"van Steen, M., Homburg, P., Tanenbaum, A.: Globe: A Wide-Area Distributed System. IEEE Concurrency, 70\u201378 (January-March 1999)","DOI":"10.1109\/4434.749137"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Weeks, S.: Understanding Trust Management Systems. In: Proc. IEEE Symp. on Security and Privacy, May 2001, pp. 94\u2013105 (2001)","DOI":"10.1109\/SECPRI.2001.924290"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:18Z","timestamp":1605644298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/11542322_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}