{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,17]],"date-time":"2025-01-17T14:10:07Z","timestamp":1737123007616,"version":"3.33.0"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_18","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T17:12:26Z","timestamp":1179767546000},"page":"118-124","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Delegation of Responsibilities"],"prefix":"10.1007","author":[{"given":"B.","family":"Crispo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"M. Abadi, M. Burrows, B. Lampson, and G. Plotkin. A Calculus for Access Control in Distibuted Systems. ACM Transaction on Programming Languages and Systems, (15):706\u2013734, September 1993.","DOI":"10.1145\/155183.155225"},{"key":"18_CR2","unstructured":"B.C. Neuman. Proxy-Based Authorization and Accounting for Distributed System. In Proceedings of the 13th International Conference on Distributed Systems, May 1993."},{"key":"18_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Security Protocol Workshop","author":"B. Crispo","year":"1997","unstructured":"B. Crispo and M. Lomas. A Certification Scheme for Electronic Commerce. In Security Protocol Workshop, volume LNCS series vol. 1189. Springer-Verlag, 1997."},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Y. Ding, P. Horster, and H. Petersen. A New Approach for Delegation Using Hierarchical Delegation Token. In Proceedings of the 2nd Conference on Computer and Communications Security.Chapman and Hall, 1996.","DOI":"10.1007\/978-0-387-35083-7_12"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"B. Lampson, M. Abadi, M. Burrows, and E. Wobber. Authentication in Distributed System: Theory and Practice. ACM Transaction on Computer Systems, (10):265\u2013310, November 1992.","DOI":"10.1145\/138873.138874"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"M.R. Low and B. Christianson. Self Authenticating Proxies. IEE Electronics Letters, 30(2):124\u2013125, January 1994.","DOI":"10.1049\/el:19940079"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"C.P. Martin and K. Ramamritham. Delegation: Efficiently Rewriting History. In Proceedings of the 14th International Conference on Data Engineering, pages 266\u2013275, April 1997.","DOI":"10.1109\/ICDE.1997.581799"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"M. Mambo, K. Usuda, and E. Okamoto. Proxy Signature for Delegating Signing Operation. In Proceedings of the 3rd ACM Conference on Computer and Communications Security, 1996.","DOI":"10.1145\/238168.238185"},{"key":"18_CR9","unstructured":"M. Mambo, K. Usuda, and E. Okamoto. Proxy Signatures: Delegation of the Power to Sign Messages. IEICE Transaction on Fundamentals, E79-A, September, 1996."},{"key":"18_CR10","unstructured":"V. Varadharajan, P. Allen, and S. Black. An Analysis of the Proxy Problem in Distributed System. In Proceedings of the IEEE Symposium on Security and Privacy, 1991."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,16]],"date-time":"2025-01-16T14:39:04Z","timestamp":1737038344000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_18"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_18","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}