{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:58:31Z","timestamp":1742914711711,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319543796"},{"type":"electronic","value":"9783319543802"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-54380-2_7","type":"book-chapter","created":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T08:32:36Z","timestamp":1489825956000},"page":"155-178","source":"Crossref","is-referenced-by-count":2,"title":["Robust Enterprise Application Security with eTRON Architecture"],"prefix":"10.1007","author":[{"given":"M. Fahim Ferdous","family":"Khan","sequence":"first","affiliation":[]},{"given":"Ken","family":"Sakamura","sequence":"additional","affiliation":[]},{"given":"Noboru","family":"Koshizuka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,19]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1145\/188280.188291","volume":"37","author":"R Anderson","year":"1994","unstructured":"Anderson, R.: Why cryptosystems fail. Commun. ACM 37, 32\u201340 (1994)","journal-title":"Commun. ACM"},{"key":"7_CR2","unstructured":"Anderson, R., Kuhn, M.: Tamper resistance - a cautionary note. In: The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 1\u201311 (1996)"},{"key":"7_CR3","unstructured":"Bilabo-Osorio, B., Dutta, S., Lanvin, B.: Global information technology report 2013: growth and jobs in a hyperconnected world. In: World Economic Forum (2013)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Harrington, A., Jensen, C.: Cryptographic access control in a distributed file system. In: Proceedings of the Eighth ACM Symposium on Access Control Models and Technologies, pp. 158\u2013165 (2003)","DOI":"10.1145\/775412.775432"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Khan, M.F.F., et al.: A secure and flexible electronic-ticket system. In: Proceedings of 33rd Annual IEEE International Computer Software and Applications Conference, pp. 421\u2013426 (2009)","DOI":"10.1109\/COMPSAC.2009.63"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Khan, M.F.F., Sakamura, K.: Context-awareness: exploring the imperative shared context of security and ubiquitous computing. In: Proceedings of 14th International Conference on Information Integration and Web-Based Applications and Services, pp. 101\u2013110 (2012)","DOI":"10.1145\/2428736.2428755"},{"issue":"4","key":"7_CR7","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/MPRV.2010.87","volume":"9","author":"N Koshizuka","year":"2010","unstructured":"Koshizuka, N., Sakamura, K.: Ubiquitous ID: standards for ubiquitous computing and the internet of things. IEEE Pervasive Comput. 9(4), 98\u2013101 (2010)","journal-title":"IEEE Pervasive Comput."},{"issue":"2","key":"7_CR8","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/MPRV.2005.40","volume":"4","author":"J Krikke","year":"2005","unstructured":"Krikke, J.: T-Engine: Japan\u2019s ubiquitous computing architecture is ready for prime Time. IEEE Pervasive Comput. 4(2), 4\u20139 (2005)","journal-title":"IEEE Pervasive Comput."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Matsuyama, K., Fujimura, K.: Distributed digital-ticket management for rights trading system. In: Proceedings of ACM Conference on Electronic Commerce, pp. 110\u2013118 (1999)","DOI":"10.1145\/336992.337020"},{"key":"7_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-72198-9","volume-title":"Smart Cards, Tokens Security and Applications","author":"KE Mayes","year":"2008","unstructured":"Mayes, K.E.: An introduction to smart cards. In: Mayes, K.E., Markantonakis, K. (eds.) Smart Cards, Tokens Security and Applications. Springer Science+Business Media, LLC, New York (2008)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Payne, C.: A cryptographic access control architecture secure against privileged attackers. In: Proceedings of the 2007 ACM Workshop on Computer Security Architecture, pp. 70\u201376 (2007)","DOI":"10.1145\/1314466.1314478"},{"key":"7_CR12","doi-asserted-by":"crossref","DOI":"10.1002\/9780470511954","volume-title":"Smart Card Applications: Design Models for Using and Programming Smart Cards","author":"W Rankl","year":"2007","unstructured":"Rankl, W.: Smart Card Applications: Design Models for Using and Programming Smart Cards, 3rd edn. Wiley, West Sussex (2007)","edition":"3"},{"key":"7_CR13","first-page":"1","volume":"2003","author":"K Sakamura","year":"2003","unstructured":"Sakamura, K.: Ubiquitous computing: making it a reality. ITU Telecom World 2003, 1\u20139 (2003)","journal-title":"ITU Telecom World"},{"issue":"6","key":"7_CR14","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/40.977753","volume":"21","author":"K Sakamura","year":"2001","unstructured":"Sakamura, K., Koshizuka, N.: The eTRON wide-area distributed-system architecture for e-commerce. IEEE Micro 21(6), 7\u201312 (2001)","journal-title":"IEEE Micro"},{"key":"7_CR15","unstructured":"Sony Global Felica Website (2016). http:\/\/www.sony.net\/Products\/felica\/index.html . Accessed 27 May 2016"},{"issue":"1","key":"7_CR16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"JA Stankovic","year":"2014","unstructured":"Stankovic, J.A.: Research directions for the internet of things. IEEE Internet Things J. 1(1), 3\u20139 (2014)","journal-title":"IEEE Internet Things J."},{"key":"7_CR17","unstructured":"T-Kernel Standard Extension (2016). http:\/\/www.tron.org\/download\/index.php?route=product\/category&path=24 . Accessed 27 May 2016"},{"key":"7_CR18","unstructured":"TRON FORUM (2016). http:\/\/www.tron.org\/ . Accessed 27 May 2016"},{"issue":"2","key":"7_CR19","first-page":"160","volume":"1","author":"LF Yap","year":"2012","unstructured":"Yap, L.F., et al.: SUCAS: smart-card-based secure user-centric attestation framework for location-based services. Int. J. Inf. Priv. Secur. Integr. 1(2), 160\u2013183 (2012a)","journal-title":"Int. J. Inf. Priv. Secur. Integr."},{"issue":"2","key":"7_CR20","doi-asserted-by":"crossref","first-page":"165","DOI":"10.7763\/IJCTE.2012.V4.443","volume":"4","author":"LF Yap","year":"2012","unstructured":"Yap, L.F., et al.: Secure consumer-oriented integrated services using activity-based attestation for converging online and in-store shopping experience. Int. J. Comput. Theory Eng. 4(2), 165\u2013170 (2012b)","journal-title":"Int. J. Comput. Theory Eng."},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Yashiro, T., et al.: T-Kernel\/SS: a secure filesystem with access control protection using tamper-resistant chip. In: Proceedings of 5th IEEE International Workshop on Security, Trust, and Privacy for Software Applications, pp. 134\u2013139 (2010)","DOI":"10.1109\/COMPSACW.2010.32"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Yashiro, T., et al.: eTNet: a smart card network architecture for flexible electronic commerce services. In: Proceedings of 4th IFIP International Conference on New Technologies, Mobility and Security, pp. 1\u20135 (2011)","DOI":"10.1109\/NTMS.2011.5720616"}],"container-title":["Lecture Notes in Computer Science","Enterprise Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-54380-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T08:55:06Z","timestamp":1498380906000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-54380-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319543796","9783319543802"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-54380-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}