{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:31:58Z","timestamp":1725489118136},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540551881"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/3-540-46766-1_1","type":"book-chapter","created":{"date-parts":[[2007,8,11]],"date-time":"2007-08-11T11:03:27Z","timestamp":1186830207000},"page":"1-23","source":"Crossref","is-referenced-by-count":8,"title":["A Calculus for Access Control in Distributed Systems"],"prefix":"10.1007","author":[{"given":"M.","family":"Abadi","sequence":"first","affiliation":[]},{"given":"M.","family":"Burrows","sequence":"additional","affiliation":[]},{"given":"B.","family":"Lampson","sequence":"additional","affiliation":[]},{"given":"G.","family":"Plotkin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, M. Burrows, C. Kaufman, and B. Lampson. Authentication and Delegation with Smart-Cards. Digital Equipment Corporation Systems Research Center report No. 67, October 1990.","DOI":"10.1007\/3-540-54415-1_53"},{"key":"1_CR2","unstructured":"M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A Calculus for Access Control in Distributed Systems. Digital Equipment Corporation Systems Research Center report No. 70, February 1990."},{"key":"1_CR3","unstructured":"H. Andr\u00e9ka. Representations of Distributive Lattice-ordered Semigroups with Binary Relations. Manuscript, August 1989."},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1098\/rspa.1989.0125","volume":"426","author":"M. Burrows","year":"1989","unstructured":"M. Burrows, M. Abadi, and R.M. Needham. A Logic of Authentication. Proceedings of the Royal Society of London A Vol. 426, 1989, pp. 233\u2013271.","journal-title":"Proceedings of the Royal Society of London A"},{"key":"1_CR5","unstructured":"CCITT. CCITT Blue Book, Recommendation X.509 and ISO 9594-8: The Directory-Authentication Framework. Geneva, March 1988."},{"issue":"1","key":"1_CR6","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1145\/322234.322243","volume":"28","author":"A. Chandra","year":"1981","unstructured":"A. Chandra, D. Kozen, and L. Stockmeyer. Alternation. JACM Vol. 28, No. 1, January 1981, pp. 114\u2013133.","journal-title":"JACM"},{"key":"1_CR7","unstructured":"National Bureau of Standards. Data Encryption Standard. Fed. Inform. Processing Standards Pub. 46. Washington DC, January 1977."},{"issue":"6","key":"1_CR8","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-22","author":"W. Diffie","year":"1976","unstructured":"W. Diffie and M. Hellman. New Directions in Cryptography. IEEE Transactions on Information Theory IT-22, No. 6, November, 1976, pp. 644\u2013654.","journal-title":"IEEE Transactions on Information Theory"},{"issue":"7","key":"1_CR9","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1145\/361011.361070","volume":"17","author":"R. Fabry","year":"1974","unstructured":"R. Fabry. Capability-based Addressing. CACM Vol. 17, No. 7, July 1974, pp. 403\u2013412.","journal-title":"CACM"},{"key":"1_CR10","unstructured":"M. Gasser, A. Goldstein, C. Kaufman, and B. Lampson. The Digital Distributed System Security Architecture. Proceedings of the 1989 National Computer Security Conference, October 1989, pp. 305\u2013319."},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"M. Gasser and E. McDermott. An Architecture for Practical Delegation in a Distributed System. Proceedings of the 1990 IEEE Symposium on Security and Privacy, May 1990, pp. 20\u201330.","DOI":"10.1109\/RISP.1990.63835"},{"key":"1_CR12","volume-title":"An Introduction to Modal Logic","author":"G.E. Hughes","year":"1968","unstructured":"G.E. Hughes and M.J. Cresswell. An Introduction to Modal Logic. Methuen Inc., New York, 1968."},{"key":"1_CR13","unstructured":"J. Kohl, C. Neuman, and J. Steiner. The Kerberos Network Authentication Service (version 5, draft 3). Available by anonymous ftp from athena-dist.mit.edu as \/pub\/doc\/kerberos\/V5DRAFT3-RFC.PS,TXT, October 1990."},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed Systems: Theory and Practice. To appear in the Proceedings of the Thirteenth Symposium on Operating System Principles, October 1991.","DOI":"10.1145\/121132.121160"},{"key":"1_CR15","unstructured":"H. Levy. Capability-based Computer Systems. Digital Press, 1983."},{"key":"1_CR16","unstructured":"S.P. Miller, C. Neuman, J.I. Schiller, and J.H. Saltzer. Kerberos Authentication and Authorization System. Project Athena Technical Plan Section E.2.1, MIT, July 1987."},{"issue":"12","key":"1_CR17","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"R.M. Needham","year":"1978","unstructured":"R.M. Needham and M.D. Schroeder. Using Encryption for Authentication in Large Networks of Computers. CACM Vol. 21, No. 12, December 1978, pp. 993\u2013999.","journal-title":"CACM"},{"key":"1_CR18","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0043079","volume-title":"Algebraic Logic and Universal Algebra in Computer Science","author":"V. Pratt","year":"1990","unstructured":"V. Pratt. Dynamic Algebras as a Well-behaved Fragment of Relation Algebras. In Algebraic Logic and Universal Algebra in Computer Science, Springer-Verlag LNCS 425, 1990."},{"issue":"2","key":"1_CR19","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"R.L. Rivest, A. Shamir, and L. Adleman. A Method for Obtaining Digital Signatures and Public-key Cryptosystems. CACM Vol. 21, No. 2, February 1978, pp. 120\u2013126.","journal-title":"CACM"},{"issue":"9","key":"1_CR20","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"J. Saltzer","year":"1975","unstructured":"J. Saltzer and M. Schroeder. The Protection of Information in Computer Systems. Proceedings of the IEEE Vol. 63, No. 9, September 1975, pp. 1278\u20131308.","journal-title":"Proceedings of the IEEE"},{"key":"1_CR21","doi-asserted-by":"crossref","unstructured":"K. Sollins. Cascaded Authentication. Proceedings of the 1988 IEEE Symposium on Security and Privacy, April 1988, pp. 156\u2013163.","DOI":"10.1109\/SECPRI.1988.8108"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2014 CRYPTO \u201991"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-46766-1_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,21]],"date-time":"2021-08-21T12:09:08Z","timestamp":1629547748000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-46766-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540551881"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/3-540-46766-1_1","relation":{},"subject":[]}}