{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:27:03Z","timestamp":1725488823897},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442554"},{"type":"electronic","value":"9783540458012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45801-8_42","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T15:19:58Z","timestamp":1186845598000},"page":"430-441","source":"Crossref","is-referenced-by-count":2,"title":["Design and Analysis of Role-Based Security Model in SNMPv3 for Policy-Based Security Management"],"prefix":"10.1007","author":[{"given":"HyungHyo","family":"Lee","sequence":"first","affiliation":[]},{"given":"BongNam","family":"Noh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,13]]},"reference":[{"key":"42_CR1","unstructured":"Y. S. Shin, Policy-based Security Management Network Architecture, NETSEC-KR2001, April, 2001."},{"key":"42_CR2","unstructured":"Wang Changkun, \u201cPolicy-based Network Management,\u201d Communication Technology Proceedings, 2000."},{"key":"42_CR3","unstructured":"Policy Framework Core Information Model, draft-ietf-policy-core-info-schema-02.txt, Internet Draft, February 1999."},{"key":"42_CR4","unstructured":"The COPS(Common Open Policy Service) Protocol, draft-ietf-rap-cops-06.txt, Internet Draft, February 1999."},{"key":"42_CR5","unstructured":"Policy Framework, draft-ietf-policy-framework00.txt, Internet Draft, September 1999."},{"key":"42_CR6","unstructured":"Policy Framework Core Information Model, draft-ietf-policy-core-info-model-02.txt, Internet Draft, October 1999."},{"key":"42_CR7","unstructured":"David F. Ferraiolo, Janet A. Cugini, D. Richard Kuhn, \u201cRole-Based Access Control(RBAC): Features and Motivations,\u201d Proceedings of the 11th Annual Computer Security Applications Conferences, December 1995, pp. 241\u2013248."},{"key":"42_CR8","unstructured":"Warwick Ford, Computer Communications Security: Principles, Standard Protocols and Techniques, Prentice-Hall, 1994."},{"key":"42_CR9","unstructured":"HyungHyo Lee, DongIk Lee, BongNam Noh, \u201cPolicy-based Security Management in SNMPv3: Role-based Approach,\u201d Workshop on Information Security Applications, November 2000."},{"key":"42_CR10","unstructured":"RFC 2571, An Architecture for Describing SNMP Management Frameworks, May, 1999."},{"key":"42_CR11","unstructured":"RFC 2572, Message Processing and Dispatching for the Simple Network Management Protocol(SNMP), May 1999."},{"key":"42_CR12","unstructured":"RFC 2574, User-based Security Model (USM) for version 3 of the Simple Network Management Protocol (SNMPv3), April 1999."},{"key":"42_CR13","unstructured":"RFC 2575, View-based Security Model (VACM) for the Simple Network Management Protocol(SNMP), April 1999."},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Ravi S. Sanhdu, Pierangela Samarati, \u201cAccess Control: Principle and Practice,\u201d IEEE Computer, September 1994, pp. 40\u201348.","DOI":"10.1109\/35.312842"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Susan J, Shepard, \u201cPolicy-Based Networks: Hype and Hope,\u201d IT Pro, January-February 2000.","DOI":"10.1109\/6294.819933"},{"key":"42_CR16","unstructured":"Morris Sloman, Network and Distributed Systems Management, Addison-Wesley, 1994."},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Stallings, W. SNMP, SNMPv2, SNMPv3 and RMON1 and RMON2, Third Edition, Addison-Wesley, 1998.","DOI":"10.1109\/COMST.1998.5340405"},{"key":"42_CR18","unstructured":"Mani Subramanian, Network Management: Principles and Practice, Addison-Wesley, 2000."}],"container-title":["Lecture Notes in Computer Science","Information Networking: Wireless Communications Technologies and Network Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45801-8_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T23:32:44Z","timestamp":1556753564000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45801-8_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442554","9783540458012"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/3-540-45801-8_42","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}