{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T00:03:30Z","timestamp":1743033810779,"version":"3.40.3"},"publisher-location":"Boston, MA","reference-count":20,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475744057"},{"type":"electronic","value":"9780387356129"}],"license":[{"start":{"date-parts":[[2002,1,1]],"date-time":"2002-01-01T00:00:00Z","timestamp":1009843200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/978-0-387-35612-9_10","type":"book-chapter","created":{"date-parts":[[2013,3,10]],"date-time":"2013-03-10T20:05:52Z","timestamp":1362945952000},"page":"123-135","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Adaptive and Secure Extranets"],"prefix":"10.1007","author":[{"given":"Yves","family":"Roudier","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Fouache","sequence":"additional","affiliation":[]},{"given":"Pierre","family":"Vannel","sequence":"additional","affiliation":[]},{"given":"Refik","family":"Molva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","first-page":"52","volume-title":"Proc. of WOA","author":"F Bellifemine","year":"2000","unstructured":"F. Bellifemine, A. Poggi, G. Rimassa, and P. Turci. An Object Oriented Framework to Realize Agent Systems. in Proc. of WOA 2000 Workshop, Parma, May 2000, pp. 52\u201357"},{"key":"10_CR2","unstructured":"B. Cheswick and S. Bellovin. Firewalls and Internet Security: Repelling the Wily Hacker. Addison Wesley, 1994, ISBN 0\u2013201\u201363357\u20134"},{"key":"10_CR3","volume-title":"Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition draft-ietfidwg-idmef-xml-06.txt","author":"C David","year":"2001","unstructured":"David Curry, Herv\u00e9 Debar. Intrusion Detection Message Exchange Format Data Model and Extensible Markup Language (XML) Document Type Definition - draft-ietfidwg-idmef-xml-06.txt. December 2001"},{"key":"10_CR4","unstructured":"http:\/\/www.permeotechnologies.com\/technology\/wpapers.htm . Permeo Technologies. e-Border white papers."},{"key":"10_CR5","volume-title":"Internet draft draft-ietf-spki-cert-structure-05.txt","author":"CM Ellison","year":"1998","unstructured":"C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Yl\u00f6nen. Simple Public Key Certificate, Internet draft draft-ietf-spki-cert-structure-05.txt, March 1998."},{"key":"10_CR6","volume-title":"Internet draft draft-ietf-spki-cert-examples-01.txt","author":"CM Ellison","year":"1998","unstructured":"C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Yl\u00f6nen. SPKI Examples, Internet draft draft-ietf-spki-cert-examples-01.txt, March 1998"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"C. M. Ellison, B. Frantz, B. Lampson, R. Rivest, B. M. Thomas, and T. Yl\u00f6nen. SPKI Certificate Theory, RFC 2693, September 1999.","DOI":"10.17487\/rfc2693"},{"key":"10_CR8","volume-title":"IP Authentication Header (RFC 2402)","author":"S Kent","year":"1998","unstructured":"S. Kent, R. Atkinson. IP Authentication Header (RFC 2402). November 1998"},{"key":"10_CR9","volume-title":"IP Encapsulating Security Payload (ESP) (RFC 2406)","author":"S Kent","year":"1998","unstructured":"S. Kent, R. Atkinson. IP Encapsulating Security Payload (ESP) (RFC 2406). November 1998."},{"key":"10_CR10","volume-title":"RFC 1928. SOCKS Protocol Version 5","author":"M Leech","year":"1996","unstructured":"M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, L. Jones. RFC 1928. SOCKS Protocol Version 5. March 1996"},{"key":"10_CR11","volume-title":"An Open Terminal Infrastructure for Personal Services","author":"A Macaire","year":"2000","unstructured":"A. Macaire. An Open Terminal Infrastructure for Personal Services. TOOLS Europe 2000, 5\u20138 June 2000, Le Mont-St-Michel, France"},{"key":"10_CR12","unstructured":"Martin Roesch. Snort - Lightweight Intrusion Detection for Networks - http:\/\/www.snort.org\/docs\/lisapaper.txt"},{"key":"10_CR13","first-page":"1929","volume-title":"The Computer Science and Engineering Handbook","author":"RS Sandhu","year":"1997","unstructured":"R. S. Sandhu, P. Samarati. Authentication, Access Controls, and Intrusion Detection, in The Computer Science and Engineering Handbook, pp 1929\u20131948, 1997"},{"key":"10_CR14","unstructured":"SEVA project home page - http:\/\/www.eurecom.fr \/\u2014nsteam\/SEVA"},{"key":"10_CR15","unstructured":"Texar. S-Peer. http:\/\/www.s-peer.com \/"},{"key":"10_CR16","volume-title":"IETF Draft","author":"SX Sun","year":"2001","unstructured":"S.X. Sun, S. Reilly, L. Lannom. Handle System Namespace and Service Definition. IETF Draft. May 2001."},{"key":"10_CR17","unstructured":"SUN Microsystems. SunScreen Secure Net 3.1, Technical Whitepaper"},{"key":"10_CR18","unstructured":"FWTK.ORG unofficial page on TIS firewall toolkit - http:\/\/www.fwtk.org\/main.html"},{"key":"10_CR19","unstructured":"IBM. Electronic Trading paner Agreement for E-Commerce. ebXML proposed specification, version 1.06."},{"key":"10_CR20","unstructured":"World Wide Web Consortium. Extensible Markup Language (XML) 1.0. W3C Recommandation. http:\/\/www.w3.org \/TR\/2000\/REC-xml-20001006"}],"container-title":["IFIP Advances in Information and Communication Technology","Advanced Communications and Multimedia Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-35612-9_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T14:59:06Z","timestamp":1562770746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-35612-9_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9781475744057","9780387356129"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-35612-9_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2002]]}}}