{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:56:14Z","timestamp":1725544574659},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540333760"},{"type":"electronic","value":"9783540333777"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11734666_14","type":"book-chapter","created":{"date-parts":[[2006,3,9]],"date-time":"2006-03-09T07:10:32Z","timestamp":1141888232000},"page":"181-195","source":"Crossref","is-referenced-by-count":0,"title":["Securing Information Gateways with Derivation-Constrained Access Control"],"prefix":"10.1007","author":[{"given":"Urs","family":"Hengartner","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Peter","family":"Steenkiste","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Gasser, M., McDermott, E.: An Architecture for Practical Delegation in a Distributed System. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 20\u201330 (1990)","DOI":"10.1109\/RISP.1990.63835"},{"key":"14_CR2","unstructured":"Kornievskaia, O., Honeyman, P., Doster, B., Coffman, K.: Kerberized Credential Translation: A Solution to Web Access Control. In: Proceedings of 10th Usenix Security Symposium (2001)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1007\/10722599_9","volume-title":"Computer Security - ESORICS 2000","author":"J. Howell","year":"2000","unstructured":"Howell, J., Kotz, D.: A Formal Semantics for SPKI. In: Cuppens, F., Deswarte, Y., Gollmann, D., Waidner, M. (eds.) ESORICS 2000. LNCS, vol.\u00a01895, pp. 140\u2013158. Springer, Heidelberg (2000)"},{"issue":"4","key":"14_CR4","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in Distributed Systems: Theory and Practice. ACM Transactions on Computer Systems\u00a010(4), 263\u2013310 (1992)","journal-title":"ACM Transactions on Computer Systems"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Neuman, B.: Proxy-Based Authorization and Accounting for Distributed Systems. In: Proceedings of International Conference on Distributed Computing Systems, pp. 283\u2013291 (1993)","DOI":"10.1109\/ICDCS.1993.287698"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Sollins, K.R.: Cascaded Authentication. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 156\u2013163 (1988)","DOI":"10.1109\/SECPRI.1988.8108"},{"issue":"4","key":"14_CR7","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B.: A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"14_CR8","unstructured":"Howell, J., Kotz, D.: End-to-end authorization. In: Proceedings of 4th Symposium on Operating System Design & Implementation (OSDI 2000), pp. 151\u2013164 (2000)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (1999)","DOI":"10.17487\/rfc2693"},{"issue":"2","key":"14_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MPRV.2002.1012334","volume":"1","author":"D. Garlan","year":"2002","unstructured":"Garlan, D., Siewiorek, D., Smailagic, A., Steenkiste, P.: Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing\u00a01(2), 22\u201331 (2002)","journal-title":"IEEE Pervasive Computing"},{"key":"14_CR11","unstructured":"Hengartner, U.: Access Control to Information in Pervasive Computing Environments. PhD thesis, Computer Science Department, Carnegie Mellon University, Available as Technical Report CMU-CS-05-160 (2005)"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Bertino, E., Bettini, C., Samarati, P.: A Temporal Authorization Model. In: Proceedings of 2nd ACM Conference on Computer and Communications Security (CCS 1994), pp. 126\u2013135 (1994)","DOI":"10.1145\/191177.191202"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Cohen, E., Jefferson, D.: Protection in the Hydra Operating System. In: Proceedings of 5th ACM Symposium on Operating Systems Principles, pp. 141\u2013160 (1975)","DOI":"10.1145\/800213.806532"},{"issue":"2","key":"14_CR14","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1145\/383891.383894","volume":"26","author":"S. Jajodia","year":"2001","unstructured":"Jajodia, S., Samarati, P., Sapino, M.L., Subrahmaninan, V.S.: Flexible Support for Multiple Access Control Policies. ACM Transactions on Database Systems\u00a026(2), 214\u2013260 (2001)","journal-title":"ACM Transactions on Database Systems"},{"key":"14_CR15","unstructured":"Song, D., Wagner, D., Perrig, A.: Practical Techniques for Searches on Encrypted Data. In: Proceedings of 2000 IEEE Symposium on Security and Privacy (2000)"},{"key":"14_CR16","doi-asserted-by":"crossref","unstructured":"Appel, A.W., Felten, E.W.: Proof-Carrying Authentication. In: Proceedings of 6th ACM Conference on Computer and Communications Security (1999)","DOI":"10.1145\/319709.319718"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11734666_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T03:40:23Z","timestamp":1555472423000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11734666_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540333760","9783540333777"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/11734666_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}