{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:13:13Z","timestamp":1725484393550},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_7","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T13:12:26Z","timestamp":1179753146000},"page":"45-50","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Overview of the AT&amp;T Labs Trust-Management Project"],"prefix":"10.1007","author":[{"given":"Joan","family":"Feigenbaum","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"7_CR1","unstructured":"Information Technology-Open Systems Interconnection \u2014 The Directory:Authentication Framework, Recommendation X.509, ISO\/IEC 9594-8."},{"key":"7_CR2","unstructured":"International Telegraph and Telephone Consultative Committee (CCITT). The Directory-Authentication Framework, Recommendation X.509 1993 update."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and A. Keromytis, The KeyNote Trust Management System, work in progress. Internet Draft, March 1998, \n                  http:\/\/www.cis.upenn.edu\/~angelos\/draft-angelos-spki-keynote.txt.gz\n                  \n                .","DOI":"10.17487\/rfc2704"},{"key":"7_CR4","first-page":"164","volume-title":"Proceedings of the Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy, Decentralized Trust Management, in Proceedings of the Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1996, pp. 164\u2013173."},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1002\/ett.4460080507","volume":"8","author":"M. Blaze","year":"1997","unstructured":"M. Blaze, J. Feigenbaum, P. Resnick, and M. Strauss, Managing Trust in an Information-Labeling System, European Transactions on Telecommunications, 8 (1997), pp. 491\u2013501. (Special issue of selected papers from the 1996 Amalfi Conference on Secure Communication in Networks.)","journal-title":"European Transactions on Telecommunications"},{"key":"7_CR6","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the 2nd Financial Cryptography Conference","author":"M. Blaze","year":"1998","unstructured":"M. Blaze, J. Feigenbaum, and M. Strauss, Compliance-Checking in the Policy-Maker Trust Management System, in Proceedings of the 2nd Financial Cryptography Conference, Lecture Notes in Computer Science, Springer, Berlin, 1998, to appear. Available in preprint form as AT&T Technical Report 98.3.2, \n                  http:\/\/www.research.att.com\/library\/trs\/TRs\/98\/98.3\/98.3.2.body.ps\n                  \n                ."},{"key":"7_CR7","first-page":"127","volume":"2","author":"Y.-H. Chu","year":"1997","unstructured":"Y.-H. Chu, J. Feigenbaum, B. LaMacchia, P. Resnick, and M. Strauss, REFEREE: Trust Management for Web Applications, World Wide Web Journal, 2 (1997), pp. 127\u2013139. (Reprinted from Proceedings of the 6th International World Wide Web Conference, World Wide Web Consortium, Cambridge, 1997, pp. 227\u2013238.)","journal-title":"World Wide Web Journal"},{"key":"7_CR8","unstructured":"C. Ellison, A Simple Public-Key Infrastructure, \n                  http:\/\/www.clark.net\/pub\/cme\/html\/spki.html\n                  \n                ."},{"key":"7_CR9","first-page":"SS77","volume-title":"Proceedings of the International Symposium on Industrial Electronics","author":"J. Lacy","year":"1997","unstructured":"J. Lacy, D. P. Maher, and J. H. Snyder, Music on the Internet and the Intellectual Property Protection Problem, in Proceedings of the International Symposium on Industrial Electronics, IEEE Press, New York, 1997, pp. SS77\u201383."},{"key":"7_CR10","unstructured":"R. Levien, L. McCarthy, and M. Blaze, Transparent Internet E-mail Security, \n                  http:\/\/www.cs.umass.edu\/~lmccarth\/crypto\/papers\/email.ps"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"P. Resnick and J. Miller, PICS: Internet Access Controls Without Censorship, Communications of the ACM, October 1996, pp. 87\u201393.","DOI":"10.1145\/236156.236175"},{"key":"7_CR12","unstructured":"R. Rivest and B. Lampson, SDSI: A Simple Distributed Security Infrastructure, \n                  http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi11.html\n                  \n                ."},{"key":"7_CR13","volume-title":"PGP User\u2019s Guide","author":"P. Zimmermann","year":"1994","unstructured":"P. Zimmermann, PGP User\u2019s Guide, MIT Press, Cambridge, 1994."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T22:44:46Z","timestamp":1578523486000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_7"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_7","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}