{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:27Z","timestamp":1725549327143},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_18","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"134-150","source":"Crossref","is-referenced-by-count":1,"title":["Regular SPKI"],"prefix":"10.1007","author":[{"given":"Mads","family":"Dam","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Bandmann, O., Dam, M.: A note on SPKI\u2019s authorisation syntax. In: Proc. 1st Annual PKI Research Workshop (2002)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bandmann, O., Dam, M., Sadighi Firozabadi, B.: Constrained delegation. In: Proc. 23rd Annual Symp. on Security and Privacy (2002)","DOI":"10.1109\/SECPRI.2002.1004367"},{"key":"18_CR3","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"Clarke, D., Elien, J.-E., Ellison, C., Fredette, M., Morcos, A., Rivest, R.L.: Certificate chain discovery in spki\/sdsi. Journal of Computer Security\u00a09, 285\u2013322 (2001)","journal-title":"Journal of Computer Security"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory. RFC 2693, expired (1999), ftp:\/\/ftp.isi.edu\/in-notes\/rfc2693.txt","DOI":"10.17487\/rfc2693"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Jha, S., Reps, T.: Analysis of SPKI\/SDSI certificates using model checking. In: Proc. IEEE Computer Security Foundations Workshop, pp. 129\u2013146 (2002)","DOI":"10.1109\/CSFW.2002.1021812"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/0304-3975(82)90125-6","volume":"27","author":"D. Kozen","year":"1983","unstructured":"Kozen, D.: Results on the propositional mu-calculus. Theoretical Computer Science\u00a027, 333\u2013354 (1983)","journal-title":"Theoretical Computer Science"},{"key":"18_CR7","unstructured":"Rivest, R.: S-expressions, Internet Draft, expired (May 1997), http:\/\/theory.lcs.mit.edu\/~rivest\/sexp.txt"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:18Z","timestamp":1605644298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/11542322_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}