{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T21:24:49Z","timestamp":1743456289068,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540663621"},{"type":"electronic","value":"9783540483908"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/3-540-48390-x_7","type":"book-chapter","created":{"date-parts":[[2007,8,28]],"date-time":"2007-08-28T15:10:11Z","timestamp":1188313811000},"page":"86-103","source":"Crossref","is-referenced-by-count":6,"title":["Reasoning about Public-Key Certification: On Bindings between Entities and Public Keys"],"prefix":"10.1007","author":[{"given":"Reto","family":"Kohlas","sequence":"first","affiliation":[]},{"given":"Ueli","family":"Maurer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,8,30]]},"reference":[{"key":"7_CR1","unstructured":"W. Stallings Protect your privacy. Prentice Hall, 1996."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"I. Lehti and P. Nikander Certifying trust. In H. Imai and Y. Theng, editors, Proceedings of the first international workshop on Practice and Theory in Public Key Cryptography, PKC\u201998, pages 83\u201398, 1998.","DOI":"10.1007\/BFb0054017"},{"key":"7_CR3","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"P.R. Zimmermann The Official PGP User\u2019s Guide. MIT Press, Cambridge, MA, USA, 1995."},{"key":"7_CR4","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/BFb0055480","volume-title":"Financial Cryptography","author":"M. Myers","year":"1998","unstructured":"M. Myers Revocation: Options and challenges. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 165\u2013172. Springer Verlag, Berlin, 1998."},{"key":"7_CR5","unstructured":"S. Micali Efficient certificate revocation. Technical report, Technical Memo MIT\/LCS\/TM-542b, 1996."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"M. Abadi On SDSI\u2019s linked local name spaces. In Proceedings of the 10th IEEE Computer Security FoundationsWorkshop, pages 98\u2013108. IEEE Computer Society, 1997.","DOI":"10.1109\/CSFW.1997.596794"},{"key":"7_CR7","series-title":"Lect Notes Comput Sci","doi-asserted-by":"crossref","first-page":"325","DOI":"10.1007\/3-540-61770-1_45","volume-title":"Proceedings 1996 European Symposium on Research in Computer Security (ESORICS\u2019 96)","author":"U. Maurer","year":"1996","unstructured":"U. Maurer Modelling a public-key infrastructure. In E. Bertino, H. Kurth, G. Martella, and E. Montolivo, editors, Proceedings 1996 European Symposium on Research in Computer Security (ESORICS\u2019 96), Lecture Notes in Computer Science, Springer, LNCS, pages 325\u2013350, 1996."},{"key":"7_CR8","unstructured":"C.E. et al SPKI http:\/\/www.clark.net\/pub\/cme\/html\/spki.html . Internet Draft, 1998. Expires: 16 September 1998."},{"key":"7_CR9","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/BFb0055481","volume-title":"Financial Cryptography","author":"P. Kocher","year":"1998","unstructured":"P. Kocher On certificate revocation and validation. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 172\u2013177. Springer Verlag, Berlin, 1998."},{"issue":"5","key":"7_CR10","doi-asserted-by":"publisher","first-page":"694","DOI":"10.1109\/49.223872","volume":"11","author":"C. Boyd","year":"1993","unstructured":"C. Boyd Security architectures using formal methods. IEEE Journal on Selected Areas in Communications, 11(5):694\u2013701, 1993.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"R. Rivest Can we eliminate certificate revocation lists? In R. Hirschfeld, editor, Proceedings of Financial Cryptography 1998, pages 178\u2013183, 1998.","DOI":"10.1007\/BFb0055482"},{"issue":"1","key":"7_CR12","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1145\/77648.77649","volume":"8","author":"M. Burrows","year":"1990","unstructured":"M. Burrows, M. Abadi, and R. Needham A logic of authentication. ACM Transactions on Computer Systems, 8(1):18\u201336, 1990.","journal-title":"ACM Transactions on Computer Systems"},{"key":"7_CR13","unstructured":"M. Naor and K. Nissim Certificate revocation and certificate update. Proceedings of Usenix\u2019 98, pages 217\u2013228, January 1998."},{"key":"7_CR14","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy Decentralized trust management. In Proceedings of the Symposium on Security and Privacy, pages 164\u2013173. IEEE Computer Society Press, 1996."},{"key":"7_CR15","unstructured":"C. Ellison Establishing identity without certification authorities. In USENIX Association, editor, 6th USENIX Security Symposium, July 22-25, 1996. San Jose, CA, pages 67\u201376. USENIX, July 1996."},{"key":"7_CR16","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1007\/BFb0055479","volume-title":"Financial Cryptography","author":"B. Fox","year":"1998","unstructured":"B. Fox and B. LaMaccia Certificate revocation: Mechanisms and meaning. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 158\u2013164. Springer Verlag, Berlin, 1998."},{"key":"7_CR17","series-title":"Lect Notes Comput Sci","first-page":"3","volume-title":"Computer Security-Esorics\u2019 94","author":"T. Beth","year":"1994","unstructured":"T. Beth, M. Borcherding, and B. Klein Valuation of trust in open systems. In D. Gollmann, editor, Computer Security-Esorics\u2019 94, volume 875 of Lecture Notes in Computer Science, pages 3\u201318. Springer Verlag, Berlin, 1994."},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1145\/146937.146940","volume":"10","author":"J. Glasgow","year":"1992","unstructured":"J. Glasgow, G. MacEwen, and P. Panagaden A logic for reasoning about security. ACM transactions on Computer Systems, 10(3):226\u2013264, 1992.","journal-title":"ACM transactions on Computer Systems"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"D. Chadwick and A. Young Merging and extending the PGP and PEM trust models. IEEE Network Magazine, May 1997.","DOI":"10.1109\/65.587045"},{"key":"7_CR20","series-title":"Lect Notes Comput Sci","first-page":"175","volume-title":"Proc. 1994 European Symposium on Research in Computer Security (ESORICS \u201894)","author":"U. Maurer","year":"1994","unstructured":"U. Maurer and P. Schmid A calculus for secure channel establishment in open networks. In D. Gollmann, editor, Proc. 1994 European Symposium on Research in Computer Security (ESORICS \u201894), volume 875, pages 175\u2013192. Lecture Notes in Computer Science, 1994."},{"key":"7_CR21","unstructured":"T.M.C.Group MCG-internet open group on certification and security, http:\/\/mcg.org.br\/ , 1998."},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"M. Reiter and S. Stubblebine Path independence for authentication in large-scale systems. Proceedings of the 4th ACM Conference on Computer and Communications Security, pages 57\u201366, 1997.","DOI":"10.1145\/266420.266435"},{"issue":"4","key":"7_CR23","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"M. Abadi, M. Burrows, B. Lampson, and G. Plotkin A calculus for access control in distributed systems. ACM Transactions on Programming Languages and Systems, 15(4):706\u2013734, September 1993.","journal-title":"ACM Transactions on Programming Languages and Systems"},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"B. Lampson","year":"1992","unstructured":"B. Lampson, M. Abadi, M. Burrows, and E. Wobber Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems, 10(4):265\u2013310, November 1992.","journal-title":"ACM Transactions on Computer Systems"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"P. Syverson and C. Meadows A logical language for specifying cryptographic protocols requirements. In IEEE Conferences on Research in Security and Privacy, pages 165\u2013180, 1993.","DOI":"10.21236\/ADA463014"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"E. Campbell, R. Safavi-Naini, and P. Pleasants Partial belief and probabilistic reasoning in the analysis of secure protocols. In The computer Security Foundations Workshop V, pages 84\u201391, 1992.","DOI":"10.1109\/CSFW.1992.236785"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"S. Stubblebine and R. Wright An authentication logic supporting synchronization, revocation, and recency. In SIGSAC: 3rd ACM Conference on Computer and Communications Security. ACM SIGSAC, 1996.","DOI":"10.1145\/238168.238195"},{"key":"7_CR28","unstructured":"S. Consortium Basic services, architecture and design, available at http:\/\/www.semper.org\/info\/index.html . Technical report, SEMPER, 1996."},{"key":"7_CR29","unstructured":"R. Rivest and B. Lampson SDSI-A simple distributed security infrastructure, http:\/\/theory.lcs.mit.edu\/~cis\/sdsi.html . Presented at CRYPTO\u201996_Rumpsession, April 1996."},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"R. Yaholem, B. Klein, and T. Beth Trust relationships in secure systems-a distributed authentication perspective. In Proceedings of the IEEE Conference on Research in Security and Privacy, pages 150\u2013164, 1993.","DOI":"10.1109\/RISP.1993.287635"},{"key":"7_CR31","series-title":"Lect Notes Comput Sci","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/BFb0055488","volume-title":"Financial Cryptography","author":"M. Blaze","year":"1998","unstructured":"M. Blaze, J. Feigenbaum, and M. Strauss Compliance checking in the policymaker trust management system. In R. Hirschfeld, editor, Financial Cryptography, volume 1465 of Lecture Notes in Computer Science, pages 254\u2013274. Springer Verlag, Berlin, 1998."},{"key":"7_CR32","unstructured":"I.I.S. 9594-8 Information technology, open systems interconnection, the directory, part 8: Authentication framework, 1990."}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-48390-X_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T18:13:56Z","timestamp":1737396836000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-48390-X_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540663621","9783540483908"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/3-540-48390-x_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1999]]}}}