{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:44:16Z","timestamp":1725493456427},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540007081"},{"type":"electronic","value":"9783540365327"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-36532-x_16","type":"book-chapter","created":{"date-parts":[[2007,10,25]],"date-time":"2007-10-25T15:34:36Z","timestamp":1193326476000},"page":"249-262","source":"Crossref","is-referenced-by-count":0,"title":["Design and Implementation of Access Control System for Smart Office Environment"],"prefix":"10.1007","author":[{"given":"Wataru","family":"Yamazaki","sequence":"first","affiliation":[]},{"given":"Fumio","family":"Mizoguchi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,6,25]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"F. Mizoguci, H. Nishiyama, H. Ohwada and H. Hiraishi, Smart office robot collaboration based of a multi-agent programming, Artificial Intelligence, Vol.114, 1999.","DOI":"10.1016\/S0004-3702(99)00068-5"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"David L. Martin, Dam J. Cheyer and Douglas B., \u201cThe Open Agent Architecture: A Framework for Building Distributed Software Systems,\u201d Applied Artificial Intelligence, Vol.13, 1999.","DOI":"10.1080\/088395199117504"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"David F. Ferraiolo, Johon F. Barkley and D. Richard Kuhn A Role Based Access Control Model and Reference Implementation within a Corporatre Internet, ACM Transactions on Information System Security, Vol.1 Number 2, 1999.","DOI":"10.1145\/300830.300834"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Ravi Sandhu, David Ferraiolo and Richard Kuhn, The NIST Model for Role-Based Access Control: Towards A Unified Standard, ACM Workshop on Role-Based Access Control 2000.","DOI":"10.1145\/344287.344301"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Wu Wen and Fumio Mizoguchi, An Authorization-based Trust Model For Multiagent Systems, To appear, Applied Artificial Intelligence, 2000.","DOI":"10.1080\/08839510050144877"},{"key":"16_CR6","unstructured":"Dirk Balfanz, Drew Dean and Mike Spreitzer, A Security Infrastructure for Distributed Java Appication, Proc. of 2000 IEEE System on Security and Privacy, 2000."},{"key":"16_CR7","unstructured":"W. Yamazaki, W. Wen and F. Mizoguchi, Analysys of Security Requirement for Smart Office, The 1999 Symposium on Cryprography and Information Security (Japanese), 1999."},{"key":"16_CR8","unstructured":"Curry, I. Trustedpublic-key infrastructure. Technical Report Entrust Technologies Ltd, 1997."},{"key":"16_CR9","unstructured":"Arsenault, A., and S. Turner. Internet x.509 public key infrastructure pkix roadmap, 1999. Technical Report, IETF PKIX Working Group."},{"key":"16_CR10","unstructured":"Bagwill, R. et al. Security in open systems. Technical Report 800-7, National Institute of Standard and Technology, 1994."},{"key":"16_CR11","unstructured":"Bell, D., and L.J. Feigenbaum, and J. Lacy. Decentralized trust management. Technical Report DIMACS, 1996."},{"key":"16_CR12","unstructured":"Ellison C. et al. Spki certificate theory, internet draft, technical Report IETF SPKI Working Group, 1997."},{"key":"16_CR13","unstructured":"Freier, A., P. Kocher, and P. Kaltorn, SSL v3.0 specification. Technical Report http:\/\/home.netscape.com\/env\/ssl3\/s -SPEC.HTM, IETF Task Force."}],"container-title":["Lecture Notes in Computer Science","Software Security \u2014 Theories and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-36532-X_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,3]],"date-time":"2019-05-03T20:54:32Z","timestamp":1556916872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-36532-X_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540007081","9783540365327"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-36532-x_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}