{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T22:40:01Z","timestamp":1737067201409,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540426103"},{"type":"electronic","value":"9783540454182"}],"license":[{"start":{"date-parts":[[2001,1,1]],"date-time":"2001-01-01T00:00:00Z","timestamp":978307200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2001]]},"DOI":"10.1007\/3-540-45418-7_7","type":"book-chapter","created":{"date-parts":[[2007,6,3]],"date-time":"2007-06-03T21:08:09Z","timestamp":1180904889000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Internet Authorization Scheme Using Smart-Card-Based Security Kernels"],"prefix":"10.1007","author":[{"given":"Yves","family":"Deswarte","sequence":"first","affiliation":[]},{"given":"Noreddine","family":"Abghour","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Nicomette","sequence":"additional","affiliation":[]},{"given":"David","family":"Powell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,9,11]]},"reference":[{"key":"7_CR1","unstructured":"[Abghour et al. 2001]_N. Abghour, Y. Deswarte, V. Nicomette and D. Powell, Specification of Authorisation Services, MAFTIA Project IST-1999-11583 Contract Report, LAAS-CNRS, N\u221801.001, Jan. 2001, http:\/\/www.maftia.org\/deliverables\/D27V13.pdf> ."},{"key":"7_CR2","unstructured":"[Ao et al. 2001]_X. Ao, N. H. Minsky and V. Ungureanu, \u201cFormal Treatment of Certificate Revocation Under Communal Access Control\u201d, in IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 116\u2013127, IEEE Computer Society Press, 2001."},{"key":"7_CR3","unstructured":"[Au et al. 2000]_R. Au, M. Looi and P. Ashley, \u201cCross-Domain One-Shot Authorization using Smart Cards\u201d, in 7th ACM Conference on Computer and Communications Security (CCS-2000), (S. Jajodia and P. Samarati, Eds.), (Athens, Greece), pp. 220\u2013226, ACM Press, 2000."},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"L. Blain and Y. Deswarte, \u201cIntrusion-Tolerant Security Server for Delta-4\u201d, in ESPRIT 90 Conference, (CEC-DG-XIII, Ed.), (Brussels (Belgium)), pp. 355\u2013370, Kluwer Academic Publishers, 1990.","DOI":"10.1007\/978-94-009-0705-8_25"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"C. Ellison, SPKI Requirements, IETF, RFC 2692, September 1999, pp.","DOI":"10.17487\/rfc2692"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"D. Hagimont and J.-J. Vandewalle, \u201cJCCap: Capability-Based Access Control for Java Card\u201d, in 4th IFIP WG8.8 Working Conference on Smart Card Research and Advanced Applications (CARDIS-2000), (J. Domingo-Ferrer, D. Chan and A. Watson, Eds.), (Bristol, UK), pp. 365\u2013388, Kluwer Academic Publishers, 2000.","DOI":"10.1007\/978-0-387-35528-3_21"},{"key":"7_CR7","unstructured":"HP, HP Praesidium Authorization Server 3.1: Increasing Security Requirements in the Extended Enterprise, November 2, 1998, accessible at the following URL: < http:\/\/www.hp.com\/security\/products\/authorization_server\/papers\/whitepaper\/ >."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"B. C. Neuman and T. Tso, \u201cKerberos: an Authentication Service for Computer Networks\u201d, IEEE Communications, 32(9), 1994.","DOI":"10.1109\/35.312841"},{"key":"7_CR9","unstructured":"V. Nicomette, La protection dans les syst\u00e8mes \u00e0 objets r\u00e9partis, Th\u00e8se de Doctorat de l\u2019Institut National Polytechnique de Toulouse, LAAS Report 96496, 1996, (in French)."},{"key":"7_CR10","series-title":"Lect Notes Comput Sci","first-page":"193","volume-title":"Proc. 2nd Asian Computing Science Conference (ASIAN\u201996)","author":"V. Nicomette","year":"1996","unstructured":"V. Nicomette and Y. Deswarte, \u201cSymbolic Rights and Vouchers for Access Control in Distributed Object Systems\u201d, in Proc. 2nd Asian Computing Science Conference (ASIAN\u201996), (Singapour), LNCS n\u22181179, pp. 193\u2013203, Springer-Verlag, 1996."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"V. Nicomette and Y. Deswarte, \u201cAn Authorization Scheme for Distributed Object Systems\u201d, in Proc. Int. Symposium on Security and Privacy, (Oakland, CA, USA), pp. 21\u201330, IEEE Computer Society Press, 1997.","DOI":"10.1109\/SECPRI.1997.601310"},{"key":"7_CR12","unstructured":"T. Parker, \u201cA Secure European System for Applications in a Multivendor Environment (The SESAME project)\u201d, in 14th National Computer Security Conference, (Washington (DC, USA)), pp. 505\u2013513, NCSC and NIST, 1991."},{"key":"7_CR13","unstructured":"[Zurko et al. 1999]_M.-E. Zurko, R. Simon and T. Sanfilipo, \u201cA User-Centered, Modular Authorization Service Built on an RBAC Foundation\u201d, in IEEE Symposium on Security and Privacy, (Berkeley (CA, USA)), pp. 57\u201371, 1999."}],"container-title":["Lecture Notes in Computer Science","Smart Card Programming and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45418-7_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T22:05:11Z","timestamp":1737065111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45418-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001]]},"ISBN":["9783540426103","9783540454182"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-45418-7_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2001]]},"assertion":[{"value":"11 September 2001","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}