{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:27:49Z","timestamp":1761611269073},"publisher-location":"Berlin, Heidelberg","reference-count":31,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540290018"},{"type":"electronic","value":"9783540319306"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11556992_31","type":"book-chapter","created":{"date-parts":[[2010,9,28]],"date-time":"2010-09-28T04:05:31Z","timestamp":1285646731000},"page":"431-445","source":"Crossref","is-referenced-by-count":42,"title":["Device-Enabled Authorization in the Grey\u00a0System"],"prefix":"10.1007","author":[{"given":"Lujo","family":"Bauer","sequence":"first","affiliation":[]},{"given":"Scott","family":"Garriss","sequence":"additional","affiliation":[]},{"given":"Jonathan M.","family":"McCune","sequence":"additional","affiliation":[]},{"given":"Michael K.","family":"Reiter","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Rouse","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Rutenbar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Abadi, M.: On SDSI\u2019s linked local name spaces. J. Computer Security (1998)","DOI":"10.3233\/JCS-1998-61-202"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.D.: A calculus for access control in distributed systems. ACM Trans. Prog. Lang. and Sys. (September 1993)","DOI":"10.1145\/155183.155225"},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Appel, A.W., Felten, E.W.: Proof-carrying authentication. In: Proc. 6th ACM Conference on Computer and Communications Security (November 1999)","DOI":"10.1145\/319709.319718"},{"issue":"3-4","key":"31_CR4","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1023\/B:JARS.0000021013.61329.58","volume":"31","author":"A.W. Appel","year":"2003","unstructured":"Appel, A.W., Michael, N., Stump, A., Virga, R.: A trustworthy proof checker. J. Automated Reasoning\u00a031(3-4), 231\u2013260 (2003)","journal-title":"J. Automated Reasoning"},{"key":"31_CR5","unstructured":"Balfanz, D., Dean, D., Spreitzer, M.: A security infrastructure for distributed Java applications. In: Proc. 21st IEEE Symposium on Security and Privacy (2002)"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Bauer, L., Garriss, S., McCune, J.M., Reiter, M.K., Rouse, J., Rutenbar, P.: Device-enabled authorization in the Grey system. Technical Report CMU-CS-05- 111, Computer Science Department, Carnegie Mellon University (February 2005)","DOI":"10.21236\/ADA457095"},{"key":"31_CR7","doi-asserted-by":"crossref","unstructured":"Bauer, L., Garriss, S., Reiter, M.K.: Distributed proving in access-control systems. In: Proc. 2005 IEEE Symposium on Security and Privacy (May 2005)","DOI":"10.1109\/SP.2005.9"},{"key":"31_CR8","unstructured":"Bauer, L., Schneider, M.A., Felten, E.W.: A general and flexible access-control system for the Web. In: Proc. 11th USENIX Security Symposium (August 2002)"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Beaufour, A., Bonnet, P.: Personal servers as digital keys. In: Proc. 2nd IEEE International Conference of Pervasive Computing and Communications (March 2004)","DOI":"10.1109\/PERCOM.2004.1276869"},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Strauss, M.: Compliance checking in the Policy- Maker trust-management system. In: Proc. 2nd Financial Crypto Conference (1998)","DOI":"10.1007\/BFb0055488"},{"key":"31_CR11","doi-asserted-by":"crossref","unstructured":"Church, A.: A formulation of the simple theory of types. J. Symbolic Logic (1940)","DOI":"10.2307\/2266170"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Coquand, T.: An algorithm for testing conversion in type theory. In: Huet, G., Plotkin, G. (eds.) Logical Frameworks, pp. 255\u2013280 (1991)","DOI":"10.1017\/CBO9780511569807.011"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"de Ipi\u00f1a, D.L., Mendon\u00e7a, P., Hopper, A.: TRIP: a low-cost vision-based location system for ubiquitous computing. Pers. and Ubiq. Comp.\u00a06(3) (2002)","DOI":"10.1007\/s007790200020"},{"key":"31_CR14","unstructured":"Dohrmann, S., Ellison, C.: Public key support for collaborative groups. In: Proc. First Annual PKI Research Workshop (April 2002)"},{"key":"31_CR15","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI certificate theory. RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"31_CR16","unstructured":"Ellison, C.M., Frantz, B., Lampson, B., Rivest, R.: Simple public key certificate. Internet Engineering Task Force Draft (July 1997)"},{"key":"31_CR17","unstructured":"Goldberg, I.: Visual key fingerprint code (1996), Available at http:\/\/www.cs.berkeley.edu\/iang\/visprint.c"},{"key":"31_CR18","doi-asserted-by":"crossref","unstructured":"Halpern, J.Y., van der Meyden, R.: A logic for SDSI\u2019s linked local name spaces. In: Proc. 12th IEEE Computer Security Foundations Workshop (1999)","DOI":"10.1109\/CSFW.1999.779767"},{"issue":"1","key":"31_CR19","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1145\/138027.138060","volume":"40","author":"R. Harper","year":"1993","unstructured":"Harper, R., Honsell, F., Plotkin, G.: A framework for defining logics. J. ACM\u00a040(1), 143\u2013184 (1993)","journal-title":"J. ACM"},{"issue":"4","key":"31_CR20","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Trans. Comp. Sys.\u00a010(4), 265\u2013310 (1992)","journal-title":"ACM Trans. Comp. Sys."},{"key":"31_CR21","unstructured":"Levin, R.: PGP snowflake. Personal communication (1996)"},{"issue":"1","key":"31_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-003-0022-8","volume":"2","author":"P. MacKenzie","year":"2003","unstructured":"MacKenzie, P., Reiter, M.K.: Networked cryptographic devices resilient to capture. International Journal of Information Security\u00a02(1), 1\u201320 (2003)","journal-title":"International Journal of Information Security"},{"key":"31_CR23","doi-asserted-by":"crossref","unstructured":"McCune, J.M., Perrig, A., Reiter, M.K.: Seeing-is-believing: Using camera phones for human-verifiable authentication. In: Proc. 2005 IEEE Symposium on Security and Privacy (May 2005)","DOI":"10.1109\/SP.2005.19"},{"key":"31_CR24","unstructured":"Perrig, A., Song, D.: Hash visualization: A new technique to improve real-world security. In: Proc. 1999 Intern. Work. Crypto. Techn. and E-Comm. (July 1999)"},{"key":"31_CR25","doi-asserted-by":"crossref","unstructured":"Ramsdell, B.: Secure\/multipurpose internet mail extensions (S\/MIME) version 3.1: Message specification. RFC 3850 (July 2004)","DOI":"10.17487\/rfc3851"},{"key":"31_CR26","doi-asserted-by":"crossref","unstructured":"Ravi, N., Stern, P., Desai, N., Iftode, L.: Accessing ubiquitous services using smart phones. In: Proc. 3rd Intern. Conf. Pervasive Comp. and Comm. (2005)","DOI":"10.1109\/PERCOM.2005.6"},{"key":"31_CR27","unstructured":"Rivest, R.L., Lampson, B.: SDSI\u2014A simple distributed security infrastructure. Presented at CRYPTO 1996 Rumpsession (April 1996)"},{"key":"31_CR28","unstructured":"Rohs, M., Gfeller, B.: Using camera-equipped mobile phones for interacting with real-world objects. Advances in Pervasive Computing, pp. 265\u2013271 (April 2004)"},{"key":"31_CR29","doi-asserted-by":"crossref","unstructured":"Scott, D., Sharp, R., Madhavapeddy, A., Upton, E.: Using visual tags to bypass Bluetooth device discovery. Mobile Comp. and Comm. Review\u00a01(2) (January 2005)","DOI":"10.1145\/1055959.1055965"},{"key":"31_CR30","unstructured":"Slawsby, A., Leibovitch, A.: Worldwide mobile phone 2004\u20132008 forecast update and 1H04 vendor shares (December 2004), http:\/\/www.idc.com\/getdoc.jsp?containerId=32336"},{"issue":"1","key":"31_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/174613.174614","volume":"12","author":"E. Wobber","year":"1994","unstructured":"Wobber, E., Abadi, M., Burrows, M., Lampson, B.: Authentication in the Taos operating system. ACM Trans. Comp. Sys.\u00a012(1), 3\u201332 (1994)","journal-title":"ACM Trans. Comp. Sys."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11556992_31.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T19:48:04Z","timestamp":1605642484000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11556992_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540290018","9783540319306"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/11556992_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}