{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,21]],"date-time":"2025-01-21T05:07:34Z","timestamp":1737436054030,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540673521"},{"type":"electronic","value":"9783540455592"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2000]]},"DOI":"10.1007\/3-540-45559-0_6","type":"book-chapter","created":{"date-parts":[[2007,8,15]],"date-time":"2007-08-15T06:33:59Z","timestamp":1187159639000},"page":"104-120","source":"Crossref","is-referenced-by-count":13,"title":["An Architecture for Distributed OASIS Services"],"prefix":"10.1007","author":[{"given":"John H.","family":"Hine","sequence":"first","affiliation":[]},{"given":"Walt","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Jean","family":"Bacon","sequence":"additional","affiliation":[]},{"given":"Ken","family":"Moody","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2001,8,24]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"L. Alvisi, B. Hoppe, and K. Marzullo. Non-blocking and orphan-free message logging protocols. 23rd Int. Conf. on Fault-Tolerant Computing (FTCS-23), pages 145\u2013154, 1993. 115, 119","DOI":"10.1109\/FTCS.1993.627318"},{"issue":"1","key":"6_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/300830.300834","volume":"2","author":"D. F. Ferraiolo","year":"1999","unstructured":"David F. Ferraiolo, John F. Barkley, and D. Richard Kuhn. A role-based access control model and reference implementation within a corporate intranet. ACM Transactions on Information and System Security, 2(1):34\u201364, Feb 1999. 104","journal-title":"ACM Transactions on Information and System Security"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"S. Floyd, V. Jacobson, and S. McCanne. A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing. In Proc. of the 1995 ACM SIGCOMM Conference, pages 342\u2013356, Cambridge, MA, Aug 1995. 113","DOI":"10.1145\/217382.217470"},{"key":"6_CR4","unstructured":"Richard Hayton. OASIS An Open Architecture for Secure Interworking Services. PhD thesis, Computer Laboratory, University of Cambridge, Mar 1995. 104, 105"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Richard Hayton, Jean Bacon, and Ken Moody. Oasis: Access control in an open, distributed environment. In Proc. of IEEE Symposium on Security and Privacy, pages 3\u201314, Oakland, CA, May 1998. IEEE. 104, 105, 106","DOI":"10.1109\/SECPRI.1998.674819"},{"key":"6_CR6","unstructured":"D. B. Johnson and W. Zwaenepoel. Sender-based message logging. 17th Int. Symp. on Fault-Tolerant Computing, pages 14\u201319, 1987. 119"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"B. W. Lampson. Protection. In Proc. Fifth Princeton Symposium on Information Sciences and Systems, pages 437\u2013443, March 1971. reprinted in Operating Systems Review, 8, 1 (Jan. 1974) pp. 417\u2013429. 104","DOI":"10.1145\/775265.775268"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Tobin J. Lehman and Michael J. Carey. A recovery algorithm for a high-performance memory-resident database system. In Proceedings of ACM SIGMOD Annual Conference on Management of Data, San Francisco, May 1987. ACM. 113","DOI":"10.1145\/38713.38730"},{"issue":"12","key":"6_CR9","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"R.M. Needham and M.D. Schroeder. Using encryption for authentication in large networks of computers. Communications of the ACM, 21(12):993\u2013999, Dec 1978. 109","journal-title":"Communications of the ACM"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/300830.300832","volume":"2","author":"M. Nyanchama","year":"1999","unstructured":"Matunda Nyanchama and Sylvia Osborn. The role graph model and conflict of interest. ACM Transactions on Information and System Security, 2(1):3\u201333, Feb 1999. 104","journal-title":"ACM Transactions on Information and System Security"},{"key":"6_CR11","first-page":"99","volume-title":"Operating Systems, An Advanced Course","author":"J. H. Saltzer","year":"1979","unstructured":"J. H. Saltzer. Naming and binding of objects. In R. Bayer, R.M. Graham, and G. Seegmuller, editors, Operating Systems, An Advanced Course, pages 99\u2013208. Springer-Verlag, Berlin, 1979. 104"},{"issue":"2","key":"6_CR12","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. S. Sandhu","year":"1996","unstructured":"Ravi S. Sandhu, Edward J. Coyne, Hal L. Feinstein, and Charles E. Youman. Role-based access control models. IEEE Computer, 29(2):38\u201347, Feb 1996. 104","journal-title":"IEEE Computer"},{"issue":"4","key":"6_CR13","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1145\/98163.98167","volume":"22","author":"F. B. Schneider","year":"1990","unstructured":"F. B. Schneider. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Computing Surveys, 22(4):299\u2013319, Dec 1990. 115","journal-title":"ACM Computing Surveys"},{"key":"6_CR14","unstructured":"J.G. Steiner, C. Neuman, and J.I. Schiller. Kerberos: An authentication service for open network systems. In USENIX, Dallas, TX, 1988. Uniforum. 107"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Gene Tsudik. Message authentication with one-way hash functions. In IEEE Infocom 1992. IEEE Press, May 1992. 108","DOI":"10.1109\/INFCOM.1992.263477"}],"container-title":["Lecture Notes in Computer Science","Middleware 2000"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45559-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T10:14:21Z","timestamp":1737368061000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45559-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"ISBN":["9783540673521","9783540455592"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45559-0_6","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2000]]}}}