{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:57:21Z","timestamp":1725487041894},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540002635"},{"type":"electronic","value":"9783540362319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-36231-2_10","type":"book-chapter","created":{"date-parts":[[2007,7,2]],"date-time":"2007-07-02T15:21:45Z","timestamp":1183389705000},"page":"108-121","source":"Crossref","is-referenced-by-count":0,"title":["QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)"],"prefix":"10.1007","author":[{"given":"Ravi","family":"Mukkamala","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,12,18]]},"reference":[{"key":"10_CR1","unstructured":"Adams, C., Llyod, S., Kent, S.: UnderstandingP ublic-Key Infrastructure Concepts: Standards and Deployment Considerations. Macmillan Technical Publishing(1999)"},{"key":"10_CR2","unstructured":"Borisov, N., Brewer, E.: Active Certificates: A Framework for Delegation. Proc. Network and Distributed System Security Symposium, (2002)"},{"key":"10_CR3","unstructured":"Denker, G., Millen, J., Miyake, Y.: PKI and Revocation Survey. SRI Technical Report, SRI-CSL-2000-01, (2000)"},{"key":"10_CR4","unstructured":"DeTreville, J.: Making certificates programmable. Proc. First Annual PKI Research Workshop, Gaithersburg, MD, USA, (2002), 48\u201355"},{"key":"10_CR5","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"172","DOI":"10.1007\/BFb0055481","volume-title":"On certificate revocation and validation","author":"P.C. Kocher","year":"1998","unstructured":"Kocher, P.C.: On certificate revocation and validation. Proc. Second International Conf. Financial Cryptography (FC\u201998), Springer-Verlag, Lecture Notes in Computer Science, Vol. 1465, (1998), 172\u2013177"},{"key":"10_CR6","unstructured":"Laing, S.G.: Attribute certificates-a new initiative in PKI technology. Technical Report, Baltimore Technologies, \n                    http:\/\/www.baltimore.com\/library\/whitepapers\/acswp-hm.html\n                    \n                  , (2001)"},{"key":"10_CR7","unstructured":"Malpani, A., Hoffman, P., Housley, R., Freeman, T.: Simple Certificate Validation Protocol (SCVP). IETF PKIX WorkingGroup Internet Draft, (2000)"},{"key":"10_CR8","unstructured":"Micali, S.: NOVOMODO: Scalable certificate validation and simplified PKI management. Proc. First Annual PKI Research Workshop, Gaithersburg, MD, USA, (2002), 9\u201319"},{"key":"10_CR9","unstructured":"Mukkamala, R., Jajodia, S.: A novel approach to certificate revocation management. Proc. Fifteenth IFIP WG 11.3 WorkingCon f. Database and Applications Security, Niagara on the Lake, Ontario, Canada, (2001), 223\u2013238"},{"key":"10_CR10","unstructured":"Mukkamala, R., Das, S., Halappanavar, M.: Recertification: A technique to improve services in public-key infrastructure. Proc. Sixteenth IFIP WG 11.3 Working Conf. Database and Applications Security, King\u2019s College, Cambridge, England, (2002), 277\u2013293"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Mukkamala, R., Balusani, S.: Active certificates: A new paradigm in digital certificate management. Proc. Workshop on Trusted Computing Paradigms, ICPP 2002, Vancouver, British Columbia, Canada, (2002), 30\u201337","DOI":"10.1109\/ICPPW.2002.1039709"},{"key":"10_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1007\/BFb0055480","volume-title":"Revocation: Options and challenges","author":"M. Myers","year":"1998","unstructured":"Myers, M.: Revocation: Options and challenges. Proc. Second International Conf. Financial Cryptography (FC\u201998), Springer-Verlag, Lecture Notes in Computer Science, Vol. 1465, (1998), 165\u2013171"},{"key":"10_CR13","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/BFb0055482","volume-title":"Can we eliminate certificate revocation lists?","author":"R. L. Rivest","year":"1998","unstructured":"Rivest, R. L.: Can we eliminate certificate revocation lists? Proc. Second International Conf. Financial Cryptography (FC\u201998), Springer-Verlag, Lecture Notes in Computer Science, Vol. 1465, (1998), 178\u2013183"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2014 INDOCRYPT 2002"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36231-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T16:13:49Z","timestamp":1550420029000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36231-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540002635","9783540362319"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36231-2_10","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}