{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:58:21Z","timestamp":1725559101198},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253389"},{"type":"electronic","value":"9783540319573"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31957-3_35","type":"book-chapter","created":{"date-parts":[[2010,7,7]],"date-time":"2010-07-07T17:26:19Z","timestamp":1278523579000},"page":"284-296","source":"Crossref","is-referenced-by-count":1,"title":["Name-Level Approach for Egress Network Access Control"],"prefix":"10.1007","author":[{"given":"Shinichi","family":"Suzuki","sequence":"first","affiliation":[]},{"given":"Yasushi","family":"Shinjo","sequence":"additional","affiliation":[]},{"given":"Toshio","family":"Hirotsu","sequence":"additional","affiliation":[]},{"given":"Kazuhiko","family":"Kato","sequence":"additional","affiliation":[]},{"given":"Kozo","family":"Itano","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","unstructured":"Aladdin Knowledge Systems. eSafe 4 implementation guide (July 2003), http:\/\/www.eAladdin.com"},{"key":"35_CR2","doi-asserted-by":"crossref","unstructured":"Baize, E., Pinkas, D.: The simple and protected GSS-API negotiation mechanism. RFC2478 (December 1998)","DOI":"10.17487\/rfc2478"},{"key":"35_CR3","unstructured":"Cisco Systems Inc. Service selection gateway (October 2003)"},{"key":"35_CR4","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Domain name system security extensions. RFC2535 (March 1999)","DOI":"10.17487\/rfc2535"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: DNS request and transaction signatures (SIG(0)s). RFC2931 (September 2000)","DOI":"10.17487\/rfc2931"},{"key":"35_CR6","doi-asserted-by":"crossref","unstructured":"Eastlake, D.: Secret key establishment for DNS (TKEY RR). RFC 2930 (September 2000)","DOI":"10.17487\/rfc2930"},{"key":"35_CR7","unstructured":"Internet System Consortium. BIND 9., http:\/\/www.isc.org"},{"key":"35_CR8","doi-asserted-by":"crossref","unstructured":"Kwan, S., Garg, P., Gilroy, J., Esibov, L., Westhead, J., Hall, R.: Generic security service algorithm for secret key transaction authentication for DNS (GSS-TSIG). RFC3645 (October 2003)","DOI":"10.17487\/rfc3645"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Leech, M.: Username\/password authentication for SOCKS V5. RFC1929 (March 1996)","DOI":"10.17487\/rfc1929"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Leech, M., Ganis, M., Lee, Y., Kuris, R., Koblas, D., Jones, L.: SOCKS protocol version 5. RFC1928 (March 1996)","DOI":"10.17487\/rfc1928"},{"key":"35_CR11","unstructured":"Loscocco, P., Smalley, S.: Integrating flexible support for security policies into the Linux operating system. 2001 USENIX Annual Technical Conference FREENIX (June 2001)"},{"issue":"10","key":"35_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/236156.236175","volume":"39","author":"P. Resnick","year":"1996","unstructured":"Resnick, P., Miller, J.: PICS: Internet access controls without censorship. Communications of the ACM\u00a039(10), 87\u201393 (1996)","journal-title":"Communications of the ACM"},{"issue":"2","key":"35_CR13","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J., Feinstein, H.L., Youman, C.E.: Role-based access control models. IEEE Computer\u00a029(2), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"35_CR14","unstructured":"Sun Microsystems Inc. System administration guide: Security services (2004), http:\/\/docs.sun.com\/db\/doc\/816-4557"},{"key":"35_CR15","unstructured":"Symantec Corporation. Symantec gateway security 5400 series refernece guide (September 2003), http:\/\/www.symantec.com"},{"key":"35_CR16","doi-asserted-by":"crossref","unstructured":"Vixie, P., Gudmundsson, O., Eastlake, D., Wellington, B.: Secret key transaction authentication for DNS (TSIG). RFC2845 (May 2000)","DOI":"10.17487\/rfc2845"},{"issue":"12","key":"35_CR17","first-page":"2802","volume":"42","author":"Y. Watanabe","year":"2001","unstructured":"Watanabe, Y., Watanabe, K., Eto, H., Tadaki, S.: An user authentication gateway system with simple user interface, low administrarion cost and wide applicability. IPSJ Journal\u00a042(12), 2802\u20132809 (2001)","journal-title":"IPSJ Journal"},{"key":"35_CR18","unstructured":"Watson, R., Morrison, W., Vance, C., Feldman, B.: The TrustedBSD MAC framework: Extensible kernel access control for FreeBSD 5.0. USENIX Annual Technical Conference, San Antonio, TX (June 2003)"},{"key":"35_CR19","unstructured":"Zorn, N.: Authentication gateway howto (November 2002), http:\/\/www.itlab.musc.edu\/~nathan\/authentication_gateway"}],"container-title":["Lecture Notes in Computer Science","Networking - ICN 2005"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31957-3_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:31:24Z","timestamp":1605742284000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31957-3_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253389","9783540319573"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31957-3_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}