{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,19]],"date-time":"2025-12-19T15:14:02Z","timestamp":1766157242314},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540656630"},{"type":"electronic","value":"9783540491354"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/3-540-49135-x_9","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T13:12:26Z","timestamp":1179753146000},"page":"59-63","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":137,"title":["KeyNote: Trust Management for Public-Key Infrastructures"],"prefix":"10.1007","author":[{"given":"Matt","family":"Blaze","sequence":"first","affiliation":[]},{"given":"Joan","family":"Feigenbaum","sequence":"additional","affiliation":[]},{"given":"Angelos D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[1999,10,29]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, and A. D. Keromytis, \u201cThe KeyNote Trust Management System,\u201c work in progress. Internet Draft, April 1998, \n                  http:\/\/www.cis.upenn.edu\/~angelos\/draft-angelos-spki-keynote.txt.gz\n                  \n                .","DOI":"10.17487\/rfc2704"},{"key":"9_CR2","first-page":"164","volume-title":"Proceedings of the 17th Symposium on Security and Privacy","author":"M. Blaze","year":"1996","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy, \u201cDecentralized Trust Management,\u201d in Proceedings of the 17th Symposium on Security and Privacy, IEEE Computer Society Press, Los Alamitos, 1996, pp. 164\u2013173."},{"key":"9_CR3","series-title":"Lect Notes Comput Sci","volume-title":"Proceedings of the 2nd Financial Crypto Conference","author":"M. Blaze","year":"1998","unstructured":"M. Blaze, J. Feigenbaum, and M. Strauss, \u201cCompliance Checking in the PolicyMaker Trust Management System,\u201c in Proceedings of the 2nd Financial Crypto Conference, Lecture Notes in Computer Science, Springer, Berlin, 1998, to appear. Available in preprint form as AT&T Technical Report 98.3.2, \n                  http:\/\/www.research.att.com\/library\/trs\/TRs\/98\/98.3\/98.3.2.body.ps\n                  \n                ."},{"key":"9_CR4","unstructured":"C. Ellison, A Simple Public-Key Infrastructure, \n                  http:\/\/www.clark.net\/pub\/cme\/html\/spki.html\n                  \n                ."},{"key":"9_CR5","unstructured":"C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen, \u201cSPKI Certificate Theory,\u201d \n                  http:\/\/www.clark.net\/pub\/cme\/theory.txt"},{"key":"9_CR6","unstructured":"R. Rivest and B. Lampson, SDSI: A Simple Distributed Security Infrastructure, \n                  http:\/\/theory.lcs.mit.edu\/~rivest\/sdsi11.html\n                  \n                ."},{"key":"9_CR7","volume-title":"X.509: The Directory Authentication Framework","author":"Consultation Committee","year":"1989","unstructured":"Consultation Committee, X.509: The Directory Authentication Framework, International Telephone and Telegraph, International Telecommunications Union, Geneva, 1989."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-49135-X_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T22:47:22Z","timestamp":1578523642000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-49135-X_9"}},"subtitle":["Position Paper"],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540656630","9783540491354"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-49135-x_9","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"29 October 1999","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}