{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:48Z","timestamp":1725566208142},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540232087"},{"type":"electronic","value":"9783540301448"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30144-8_21","type":"book-chapter","created":{"date-parts":[[2010,9,19]],"date-time":"2010-09-19T00:34:45Z","timestamp":1284856485000},"page":"245-256","source":"Crossref","is-referenced-by-count":10,"title":["Using Mediated Identity-Based Cryptography to Support Role-Based Access Control"],"prefix":"10.1007","author":[{"given":"D.","family":"Nali","sequence":"first","affiliation":[]},{"given":"C.","family":"Adams","sequence":"additional","affiliation":[]},{"given":"A.","family":"Miri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/3-540-45831-X_18","volume-title":"Infrastructure Security","author":"L. Chen","year":"2002","unstructured":"Chen, L., Harrison, K., Soldera, D., Smart, N.P.: Applications of Multiple Trust Authorities in Pairing Based Cryptosystems. In: Davida, G.I., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, pp. 260\u2013275. Springer, Heidelberg (2002)"},{"key":"21_CR2","unstructured":"Boneh, G.T.D., Ding, X., Wong, C.: A Method for Fast revocation of Public Key Certificates and Security Capabilities. In: Proceedings of the 10th USENIX Security Symposium, USENIX, pp. 297\u2013308 (2001)"},{"key":"21_CR3","unstructured":"Ding Dan Boneh, X., Tsudik, G.: Identity-based Mediated RSA. In: Proceedings of the third International Workshop on Information and Security Applications (WISA 2002), Jeju Island, Korea (2002)"},{"issue":"3","key":"21_CR4","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D.F. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D.F., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed NIST Standard for Role-Based Access Control. ACM Trans. Inf. Syst. Secur.\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1145\/872035.872059","volume-title":"Proceedings of the twenty-second annual symposium on Principles of distributed computing","author":"B. Libert","year":"2003","unstructured":"Libert, B., Quisquater, J.-J.: Efficient Revocation and Threshold Pairing Based Cryptosystems. In: Proceedings of the twenty-second annual symposium on Principles of distributed computing, pp. 163\u2013171. ACM Press, New York (2003)"},{"key":"21_CR6","unstructured":"Nali, D., Miri, A., Adams, C.: Mediated Hierarchical Identity-Based Cryptography (2004) (in preparation)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30144-8_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:52:28Z","timestamp":1620013948000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30144-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540232087","9783540301448"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30144-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}