{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:50:59Z","timestamp":1743105059372,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540442707"},{"type":"electronic","value":"9783540458111"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45811-5_8","type":"book-chapter","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T05:43:51Z","timestamp":1192772631000},"page":"102-116","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Role-Based Access Control for E-commerce Sea-of-Data Applications"],"prefix":"10.1007","author":[{"given":"G.","family":"Navarro","sequence":"first","affiliation":[]},{"given":"S.","family":"Robles","sequence":"additional","affiliation":[]},{"given":"J.","family":"Borrell","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,5]]},"reference":[{"key":"8_CR1","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/3-540-48749-2_9","volume-title":"Secure Internet Programming: Security Issues for Distributed and Mobile Objects","author":"T. Aura","year":"1999","unstructured":"T. Aura. Distributed access-rights management with delegation certificates. In J. Vitek and C. Jensen, editors, Secure Internet Programming: Security Issues for Distributed and Mobile Objects, volume 1603 of LNCS,pages 211\u2013235. Springer, 1999."},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1023\/A:1019211714301","volume":"1","author":"J. Baumann","year":"1998","unstructured":"J. Baumann, F. Hohl, K. Rothermel, and M. Stra\u00dfer. Mole \u2014 Concepts of a Mobile Agent System. Special Issue on Distributed World Wide Web Processing: Applications and Techniques of Web Agents,1(3):123\u2013137,1998.","journal-title":"Distributed World Wide Web Processing: Applications and Techniques of Web Agents"},{"key":"8_CR3","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0057643","volume-title":"Mobile Agents","author":"D. Chess","year":"1998","unstructured":"D. Chess. Security issues of mobile agents. In Mobile Agents, volume 1477 of LNCS, pages 1\u201312. Springer-Verlang,1998."},{"issue":"9","key":"8_CR4","doi-asserted-by":"publisher","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D. Clarke","year":"2001","unstructured":"D. Clarke, J. Elien, C. Ellison, M. Fredette, A. Morcos, and R. Rivest. Certificate chain discovery in SPKI\/SDSI. Journal of Computer Security, 9(9):285\u2013322,2001.","journal-title":"Journal of Computer Security"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. RFC 2693: SPKI certificate theory. The Internet Society, September 1999.","DOI":"10.17487\/rfc2693"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"E. Freudenthal, T. Pesin, L. Port, E. Keenan, and V. Karamcheti. dRBAC: Distributed role-based access control for dynamic coalition environments. New York University, Technical Report TR2001-819.(to appear ICDCS 2002),2001.","DOI":"10.21236\/ADA440599"},{"key":"8_CR7","unstructured":"Intel Architecture Labs. Intel Common Data Security Architecture. \nhttp:\/\/developer.intel.com\/ial\/security\/\n\n."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"L. Kagal, T. Finn, and A. Joshi. Trust-Based Security in Pervasive Computing Environments. IEEE Computer, pages 154\u2013157, Dec. 2001.","DOI":"10.1109\/2.970591"},{"key":"8_CR9","series-title":"Lect Notes Comput Sci","first-page":"194","volume-title":"Protecting the Computation of Free-Roaming Agents","author":"G. Karjoth","year":"1998","unstructured":"G. Karjoth, N. Asokan, and C. G\u00fclc\u00fc. Protecting the Computation of Free-Roaming Agents. In Proceedings of the Second International Workshop on Mobile Agents, LNCS 1477,pages 194\u2013207. Springer-Verlag, 1998."},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"D. Rerraiolo, R. Sandhu, S. Gavrila, D. Kuhn, and R Chandramouli. Proposed NIST standard for role-based access control. In ACM Transactions on Information and System Security, volume 4, pages 224\u2013274, August 2001.","DOI":"10.1145\/501978.501980"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"J. Riordan and B. Schneier. Environmental key generation towards clueless agents. In Mobile Agents and Security, pages 15\u201324,1998.","DOI":"10.1007\/3-540-68671-1_2"},{"key":"8_CR12","unstructured":"R. Rivest. S-expressions. Internet-draft: <draft-rivest-sexp-00.txt>. The Internet Society, 1997."},{"key":"8_CR13","unstructured":"S. Robles, J. Mir, and J. Borrell. Marism-a: An architecture for mobile agents with recursive itinerary and secure migration. In 2nd. IW on Security of Mobile Multiagent Systems, Bologna, 2002."},{"issue":"4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1142\/S0218843098000179","volume":"7","author":"M. Stra\u03b2er","year":"1998","unstructured":"M. Stra\u03b2er and K. Rothermel. Reliability Concepts for Mobile Agents. International Journal of Cooperative Information Systems (IJCIS),7(4):355\u2013382,1998.","journal-title":"International Journal of Cooperative Information Systems (IJCIS)"},{"key":"8_CR15","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/BFb0053415","volume-title":"Trends in Distributed Systems for Electronic Commerce","author":"M. Stra\u00dfer","year":"1998","unstructured":"M. Stra\u00dfer, K. Rothermel, and C. Maifer. Providing Reliable Agents for Electronic Commerce. In Trends in Distributed Systems for Electronic Commerce, LNCS 1402, pages 241\u2013253. Springer-Verlag, 1998."}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45811-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,27]],"date-time":"2020-01-27T18:03:27Z","timestamp":1580148207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45811-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540442707","9783540458111"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/3-540-45811-5_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2002]]},"assertion":[{"value":"5 September 2002","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}