{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:12:38Z","timestamp":1725484358987},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540438618"},{"type":"electronic","value":"9783540454502"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45450-0_5","type":"book-chapter","created":{"date-parts":[[2007,5,19]],"date-time":"2007-05-19T16:53:10Z","timestamp":1179593590000},"page":"56-70","source":"Crossref","is-referenced-by-count":9,"title":["Modelling Trust Structures for Public Key Infrastructures"],"prefix":"10.1007","author":[{"given":"Marie","family":"Henderson","sequence":"first","affiliation":[]},{"given":"Robert","family":"Coulter","sequence":"additional","affiliation":[]},{"given":"Ed","family":"Dawson","sequence":"additional","affiliation":[]},{"given":"Eiji","family":"Okamoto","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,6,21]]},"reference":[{"key":"5_CR1","unstructured":"R. Anderson, B. Crispo, J. Lee, C. Manifavas, V. Matyas, F. Petitcolas, The Global Internet Trust Register, MIT Press, 1999."},{"issue":"3","key":"5_CR2","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/65.587045","volume":"11","author":"D. W. Chadwick","year":"1997","unstructured":"D. W. Chadwick, A. J. Young, and N. K. Cicovic, Merging and extending the PGP and PEM trust models: the ICE-TEL trust model, IEEE Network, 11(3), 16\u201324, 1997.","journal-title":"IEEE Network"},{"key":"5_CR3","unstructured":"Defense Information Systems Agency, State Analysis of Certification Path Processing Procedures, June 2000. http:\/\/www-pki.itsi.disa.mil\/certpathproc.htm"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, SPKI Certificate Theory, Request for Comment 2693, September 1999. ftp:\/\/ftp.isi.edu\/in-notes\/rfc2693.txt","DOI":"10.17487\/rfc2693"},{"key":"5_CR5","unstructured":"Federal Public Key Infrastructure Steering Committee http:\/\/www.cio.gov\/fpkisc\/"},{"key":"5_CR6","unstructured":"M. Henderson, M. Burmester, E. Dawson, and E. Okamoto, Weaknesses in Public Key Infrastructures, Proceedings of the First Workshop on Information Security Applications (WISA 2000), November 2000, 53\u201366."},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, T. Polk, and D. Solo, Internet X.509 Public Key Infrastructure Certificate and CRL Profile Request for Comment 2459, 1999. http:\/\/www.ietf.org\/html.charters\/pkix-charter.html .","DOI":"10.17487\/rfc2459"},{"key":"5_CR8","unstructured":"R. Housley and T. Polk, Planning for PKI: Best Practices Guide for Deploying Public Key Infrastructure, John Wiley and Sons, 2001."},{"key":"5_CR9","unstructured":"ITU-T Recommendation X.509, Information Technology-Open Systems Interconnection-The Directory: Authentication Framework, June 1997 (equivalent to ISO\/IEC 9594-8, 1997). http:\/\/www.imc.org\/ietf-pkix\/mail-archive\/msg04337.html)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"S. Kent, Privacy Enhancement for Internet Electronic Mail, Part II: Certificate-Based Key Management, Request for Comment 1422, February 1993. http:\/\/www.ietf.org\/rfc\/rfc1422.txt?number=1422","DOI":"10.17487\/rfc1422"},{"key":"5_CR11","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/978-3-540-46588-1_7","volume-title":"Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000)","author":"C. Liu","year":"2000","unstructured":"C. Liu, M. Ozols, M. Henderson, and T. Cant, A State-Based Model for Certificate Management Systems, Public Key Cryptography: Third International Workshop on Practice and Theory in Public Key Cryptography (PKC 2000), Lecture Notes in Computer Science, 1751, 2000, 75\u201392."},{"key":"5_CR12","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"206","DOI":"10.1007\/10718964_17","volume-title":"Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP 2000)","author":"M. Ozols","year":"2000","unstructured":"M. Ozols, M. Henderson, C. Liu, and T. Cant, The PKI Specification Dilemma: A Formal Solution, Proceedings of the 5th Australasian Conference on Information Security and Privacy (ACISP 2000), Lecture Notes in Computer Science, 1841, 2000, 206\u2013219."},{"issue":"6","key":"5_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R. Perlman","year":"1999","unstructured":"R. Perlman, An Overview of PKI Trust Models, IEEE Network, 13(6), 38\u201343, 1999.","journal-title":"IEEE Network"},{"key":"5_CR14","volume-title":"The Official PGP User\u2019s Guide","author":"P. R. Zimmermann","year":"1995","unstructured":"P. R. Zimmermann, The Official PGP User\u2019s Guide, MIT Press, Cambridge, Massachussets, 1995."}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45450-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,28]],"date-time":"2019-04-28T01:39:33Z","timestamp":1556415573000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45450-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540438618","9783540454502"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/3-540-45450-0_5","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}