{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T06:27:40Z","timestamp":1725863260102},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319430041"},{"type":"electronic","value":"9783319430058"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-43005-8_4","type":"book-chapter","created":{"date-parts":[[2016,8,13]],"date-time":"2016-08-13T11:40:59Z","timestamp":1471088459000},"page":"139-162","source":"Crossref","is-referenced-by-count":1,"title":["Distributed Authorization in Vanadium"],"prefix":"10.1007","author":[{"given":"Ankur","family":"Taly","sequence":"first","affiliation":[]},{"given":"Asim","family":"Shankar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,8,14]]},"reference":[{"key":"4_CR1","unstructured":"Fridge sends spam emails as attack hits smart gadgets. http:\/\/www.bbc.com\/news\/technology-25780908"},{"key":"4_CR2","unstructured":"Hackers remotely kill a jeep on the highway? with me in it. https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/"},{"key":"4_CR3","unstructured":"Openid. http:\/\/openid.net\/"},{"key":"4_CR4","unstructured":"Smart meters can be hacked to cut power bills. http:\/\/www.bbc.com\/news\/technology-29643276"},{"key":"4_CR5","unstructured":"The Internet of Things is wildly insecure? and often unpatchable. https:\/\/www.schneier.com\/essays\/archives\/2014\/01\/the_internet_of_thin.html"},{"key":"4_CR6","unstructured":"Vanadium. http:\/\/vanadium.github.io\/"},{"key":"4_CR7","unstructured":"Vanadium Authentication Protocol. https:\/\/vanadium.github.io\/designdocs\/authentication.html"},{"key":"4_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1007\/978-3-319-25527-9_3","volume-title":"Programming Languages with Applications to Biology and Security","author":"M Abadi","year":"2015","unstructured":"Abadi, M., Burrows, M., Pucha, H., Sadovsky, A., Shankar, A., Taly, A.: Distributed authorization with distributed grammars. In: Bodei, C., Ferrari, G.-L., Priami, C. (eds.) Programming Languages with Applications to Biology and Security. LNCS, vol. 9465, pp. 10\u201326. Springer, Heidelberg (2015)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Appel, A., Felten, E.: Proof-carrying authentication. In: CCS, pp. 52\u201362 (1999)","DOI":"10.1145\/319709.319718"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Birgisson, A., Politz, J.G., Erlingsson, U., Taly, A., Vrable, M., Lentczner, M.: Macaroons: Cookies with contextual caveats for decentralized authorization in the cloud. In: NDSS (2014)","DOI":"10.14722\/ndss.2014.23212"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Ioannidis, J.: The KeyNote Trust-Management System Version 2. RFC 2704 (Proposed Standard), September 1999","DOI":"10.17487\/rfc2704"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy, pp. 164\u2013173 (1996)","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"4_CR13","unstructured":"Borisov, N., Brewer, E.: Active certificates: a framework for delegation. In: NDSS, pp. 30\u201340 (2002)"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Braz, C., Robert, J.: Security and usability: the case of the user authentication methods. In: Conference on L\u2019Interaction Homme-Machine, pp. 199\u2013203 (2006)","DOI":"10.1145\/1132736.1132768"},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1007\/3-540-45708-9_10","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"R Canetti","year":"2002","unstructured":"Canetti, R., Krawczyk, H.: Security analysis of IKE\u2019s signature-based key-exchange protocol. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 143\u2013161. Springer, Heidelberg (2002)"},{"key":"4_CR16","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D Clarke","year":"2001","unstructured":"Clarke, D., Elien, J., Ellison, C., Fredette, M., Morcos, A., Rivest, R.: Certificate chain discovery in SPKI\/SDSI. J. Comput. Secur. 9, 285\u2013322 (2001)","journal-title":"J. Comput. Secur."},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), August 2008","DOI":"10.17487\/rfc5246"},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: SPKI Certificate Theory. RFC 2693 (Proposed Standard), September 1999","DOI":"10.17487\/rfc2693"},{"key":"4_CR19","unstructured":"Hewlett Packard Enterprise: Internet of things research study. http:\/\/www8.hp.com\/h20195\/V2\/GetPDF.aspx\/4AA5-4759ENW.pdf"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Gong, L.: A secure identity-based capability system. In: IEEE Symposium on Security and Privacy, pp. 56\u201363 (1989)","DOI":"10.1109\/SECPRI.1989.36277"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Hardt, E.: The OAuth 2.0 Authorization Framework. RFC 6749 (Proposed Standard), October 2012","DOI":"10.17487\/rfc6749"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: theory and practice. In: SOSP, pp. 165\u2013182 (1991)","DOI":"10.1145\/121132.121160"},{"key":"4_CR23","unstructured":"Li, N., Feigenbaum, J., Grosof, B.N.: A logic-based knowledge representation for authorization with delegation. In: CSFW, pp. 162\u2013174 (1999)"},{"key":"4_CR24","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. RFC 2560 (Proposed Standard), June 1999","DOI":"10.17487\/rfc2560"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Neuman, B.C.: Proxy-based authorization and accounting for distributed systems. In: ICDCS, pp. 283\u2013291 (1993)","DOI":"10.1109\/ICDCS.1993.287698"},{"key":"4_CR26","unstructured":"Rapid7. Hacking IoT: A case study on baby monitor exposures and vulnerabilities. https:\/\/www.rapid7.com\/resources\/iot\/baby-monitors.jsp"},{"key":"4_CR27","unstructured":"Rivest, R.L., Lampson, B.: SDSI - a simple distributed security infrastructure. Technical report (1996). http:\/\/people.csail.mit.edu\/rivest\/sdsi11"},{"key":"4_CR28","unstructured":"Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard), May 2008"},{"key":"4_CR29","unstructured":"Schneider, F.B.: Untitled textbook on cybersecurity. Chap. 9: Credentials-based authorization (2013). http:\/\/www.cs.cornell.edu\/fbs\/publications\/chptr.CredsBased.pdf"},{"key":"4_CR30","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, pp. 169\u2013183 (1999)"},{"key":"4_CR31","unstructured":"Wu, D.J., Taly, A., Shankar, A., Boneh, D.: Privacy, discovery, and authentication for the internet of things (2016). https:\/\/arxiv.org\/abs\/1604.06959"},{"key":"4_CR32","volume-title":"The Official PGP User\u2019s Guide","author":"PR Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge (1995)"}],"container-title":["Lecture Notes in Computer Science","Foundations of Security Analysis and Design VIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-43005-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T10:47:33Z","timestamp":1568285253000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-43005-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319430041","9783319430058"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-43005-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}