{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:56:32Z","timestamp":1725468992425},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540342953"},{"type":"electronic","value":"9783540342977"}],"license":[{"start":{"date-parts":[[2006,1,1]],"date-time":"2006-01-01T00:00:00Z","timestamp":1136073600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11755593_20","type":"book-chapter","created":{"date-parts":[[2006,8,25]],"date-time":"2006-08-25T15:28:17Z","timestamp":1156519697000},"page":"267-282","source":"Crossref","is-referenced-by-count":2,"title":["Provision of Trusted Identity Management Using Trust Credentials"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]},{"given":"Marco Casassa","family":"Mont","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"volume-title":"Trusted Computing Platforms","year":"2002","unstructured":"Pearson, S. (ed.): Trusted Computing Platforms. Prentice-Hall, Englewood Cliffs (2002)","key":"20_CR1"},{"unstructured":"TCG: TCG Main Specification, v1.1b (2003), Available via: http:\/\/www.trustedcomputinggroup.org","key":"20_CR2"},{"unstructured":"Brands, S.: A Semi-Technical Overview of Digital Credentials. International Journal on Information Security (August 2002), Available via: http:\/\/www.credentica.com","key":"20_CR3"},{"unstructured":"Pretty Good Privacy, See: http:\/\/www.pgpi.org","key":"20_CR4"},{"key":"20_CR5","first-page":"1","volume-title":"International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability","author":"A. Pfitzmann","year":"2001","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudeonymity \u2013 a proposal for terminology. In: Federrath, H. (ed.) International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp. 1\u20139. Springer, New York (2001)"},{"unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, IETF (1999)","key":"20_CR6"},{"unstructured":"IETF: IETF PKIX Working Group (2005), http:\/\/www.ietf.org\/html.charters\/pkix-charter.html","key":"20_CR7"},{"doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory, RFC 2693, IETF (1999)","key":"20_CR8","DOI":"10.17487\/rfc2693"},{"unstructured":"W3C, XML Signature WG (2003), http:\/\/www.w3.org\/Signature\/","key":"20_CR9"},{"key":"20_CR10","volume-title":"Improving the TCPA specification","author":"W. Arbaugh","year":"2002","unstructured":"Arbaugh, W.: Improving the TCPA specification. IEEE Computer, Los Alamitos (2002)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/11429760_21","volume-title":"Trust Management","author":"S. Pearson","year":"2005","unstructured":"Pearson, S.: Trusted Computing: Strengths, Weaknesses and Further Opportunities for Enhancing Privacy. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol.\u00a03477, pp. 305\u2013320. Springer, Heidelberg (2005)"},{"unstructured":"TCG: Interoperability Specification for Backup and Migration Services, v1.0 (June 2005), Available via: www.trustedcomputinggroup.org","key":"20_CR12"},{"issue":"3","key":"20_CR13","first-page":"221","volume":"18","author":"J. Hughes","year":"1999","unstructured":"Hughes, J.: Certificate inter-operability \u2013 White Paper. Computers and Security, International Journal devoted to the study of technical and financial aspects of computer security\u00a018(3), 221\u2013230 (1999)","journal-title":"Computers and Security, International Journal devoted to the study of technical and financial aspects of computer security"},{"key":"20_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1007\/3-540-45353-9_25","volume-title":"Topics in Cryptology - CT-RSA 2001","author":"A. Herzberg","year":"2001","unstructured":"Herzberg, A., Mass, Y.: Relying Party Credentials Framework. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol.\u00a02020, pp. 328\u2013343. Springer, Heidelberg (2001)"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-Based Encryption from the Weil Pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, p. 213. Springer, Heidelberg (2001)"},{"doi-asserted-by":"crossref","unstructured":"Cocks, C.: An Identity Based Encryption Scheme based on Quadratic Residues, Communications Electronics Security Group (CESG), UK (2001), Available via: http:\/\/www.cesg.gov.uk\/technology\/id-pkc\/media\/ciren.pdf","key":"20_CR16","DOI":"10.1007\/3-540-45325-3_32"},{"unstructured":"Wave System, Embassy Key Management Server (2006), http:\/\/www.wave.com\/products\/ktmes.html","key":"20_CR17"},{"unstructured":"Intel, LaGrande Technology Architectural Overview (September 2003), Available via: http:\/\/www.intel.com\/technology\/security\/downloads\/LT_Arch_Overview.pdf","key":"20_CR18"},{"unstructured":"Microsoft, Next-Generation Secure Computing Base home page (2006), http:\/\/www.microsoft.com\/resources\/ngscb","key":"20_CR19"},{"unstructured":"Liberty Alliance Project (2006), http:\/\/www.projectliberty.org\/","key":"20_CR20"},{"unstructured":"W3C, XML Key Management Specification (XKMS) (2003), http:\/\/www.w3.org\/TR\/xkms\/","key":"20_CR21"},{"unstructured":"IBM, The Enterprise Privacy Authorization Language (EPAL), EPAL 1.2 specification, IBM (2004), http:\/\/www.zurich.ibm.com\/security\/enterprise-privacy\/epal\/","key":"20_CR22"},{"unstructured":"OASIS, eXtensible Access Control Markup Language (XACML), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml","key":"20_CR23"},{"unstructured":"W3C, The Platform for Privacy Preferences 1.0 (2002), http:\/\/www.w3.org\/TR\/P3P\/","key":"20_CR24"},{"doi-asserted-by":"crossref","unstructured":"Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language (2001), Available via: http:\/\/www-dse.doc.ic.ac.uk\/research\/policies\/index.shtml","key":"20_CR25","DOI":"10.1007\/3-540-44569-2_2"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-540-39650-5_9","volume-title":"Computer Security \u2013 ESORICS 2003","author":"M. Casassa Mont","year":"2003","unstructured":"Casassa Mont, M., Pearson, S., Bramhall, P.: Towards Accountable Management of Privacy and Identity Information. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol.\u00a02808, pp. 146\u2013161. Springer, Heidelberg (2003)"},{"unstructured":"Biskup, J., Karabulut, Y.: A hybrid PKI model with an application for secure mediation. In: 16th Annual IFIP WG 11.3 Working Conference on Data and Application Security, Cambridge, England (July 2002)","key":"20_CR27"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM\u00a024(2) (February 1981)","key":"20_CR28","DOI":"10.1145\/358549.358563"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D.: Achieving Electronic Privacy. Scientific American, pp. 96\u2013101 ( August 1992)","key":"20_CR29","DOI":"10.1038\/scientificamerican0892-96"},{"key":"20_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/3-540-39805-8_28","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"D. Chaum","year":"1986","unstructured":"Chaum, D.: Showing credentials without identification. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 241\u2013244. Springer, Heidelberg (1986)"},{"key":"20_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"20_CR32","first-page":"164","volume-title":"Proceedings 17th Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings 17th Symposium on Security and Privacy, pp. 164\u2013173. IEEE Computer Society Press, Los Alamitos (1996)"},{"unstructured":"Casassa Mont, M., Bramhall, P., Dalton, C.R., Harrison, K.: A Flexible Role-based Secure Messaging Service: Exploiting IBE in a Health Care Trial, HPL-2003-21 (2003)","key":"20_CR33"},{"doi-asserted-by":"crossref","unstructured":"Casassa Mont, M., Harrison, K., Sadler, M.: The HP Time Vault Service: Exploiting IBE for Timed Release of Confidential Information. In: WWW 2003 (2003)","key":"20_CR34","DOI":"10.1145\/775173.775175"},{"unstructured":"PRIME Project: Privacy and Identity Management for Europe, European RTD Integrated Project under the FP6\/IST Programme (2005), http:\/\/www.prime-project.eu.org\/","key":"20_CR35"}],"container-title":["Lecture Notes in Computer Science","Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11755593_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T20:25:03Z","timestamp":1555791903000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11755593_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540342953","9783540342977"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/11755593_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}