{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:13Z","timestamp":1725558673206},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_2","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T12:42:55Z","timestamp":1277901775000},"page":"13-24","source":"Crossref","is-referenced-by-count":0,"title":["POSSET \u2013 Policy-Driven Secure Session Transfer"],"prefix":"10.1007","author":[{"given":"Philip","family":"Robinson","sequence":"first","affiliation":[]},{"given":"Christian","family":"Schaefer","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Walter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1007\/3-540-44958-2_17","volume-title":"Modeling and Using Context","author":"G. Kouadri Most\u00e9faoui","year":"2003","unstructured":"Kouadri Most\u00e9faoui, G., Br\u00e9zillon, P.: A Generic Framework for Context-Based Distributed Authorizations. In: Blackburn, P., Ghidini, C., Turner, R.M., Giunchiglia, F. (eds.) CONTEXT 2003. LNCS, vol.\u00a02680, pp. 204\u2013217. Springer, Heidelberg (2003)"},{"doi-asserted-by":"crossref","unstructured":"Bagrodia, R., Bhattacharyya, S., Cheng, F., et al.: iMASH: Interactive Mobile Application Session Handoff. In: ACM International Conference on Mobile Systems, Applications, and Services (MobiSys 2003) (May 2003)","key":"2_CR2","DOI":"10.1145\/1066116.1066124"},{"doi-asserted-by":"crossref","unstructured":"Skow, E., Kong, J., Phan, T., Cheng, F., et al.: A Security Architecture for Application Session Handoff. In: International Conference on Communications (ICC 2002), April 28 - May 2 (2002)","key":"2_CR3","DOI":"10.1109\/ICC.2002.997210"},{"unstructured":"ITU-T Recommendation X.511: Abstract Service Definition (1993)","key":"2_CR4"},{"key":"2_CR5","volume-title":"The TINA Book","author":"H. Berndt","year":"1999","unstructured":"Berndt, H., et al.: The TINA Book. Prentice Hall, Europe (1999)"},{"unstructured":"NTT DoCoMo: All-IP Mobile Network Platform supporting a Ubiquitous Society \u2013 cover page. NTT DoCoMo Technical Journal\u00a04(4) (March 2003)","key":"2_CR6"},{"doi-asserted-by":"crossref","unstructured":"Shirey, R.: Internet Security Glossary. In: IETF International Request for Comments, vol. 2828 (May 2000)","key":"2_CR7","DOI":"10.17487\/rfc2828"},{"unstructured":"Robinson, P., Rits, M., Kilian-Kehr, R.: An Aspect of Application Security Management. In: AOSD Workshop on Application-level security (AOSDSEC), Lancaster, UK (March 2004)","key":"2_CR8"},{"unstructured":"Thakolsri, S., Kellerer, W.: Application-layer mobility, DoCoMo Euro-Labs Internal Technical Report (January 2004)","key":"2_CR9"},{"doi-asserted-by":"crossref","unstructured":"Handley, M., Jacobson, V.: Session Definition Protocol, IETF RFC 2327 (April 1998)","key":"2_CR10","DOI":"10.17487\/rfc2327"},{"doi-asserted-by":"crossref","unstructured":"Walter, T., Bussard, L., Roudier, Y., Haller, J., Kilian-Kehr, R., Posegga, J., Robinson, P.: Secure Mobile Business Applications \u2013 Framework. Architecture and Implementation, Information Security Technical Report\u00a09(4) (2004)","key":"2_CR11","DOI":"10.1016\/S1363-4127(05)70036-4"},{"doi-asserted-by":"crossref","unstructured":"Schulzrinne, H., Wedlund, E.: Application-Layer Mobility Using SIP. ACM Mobile Computing and Communications Review\u00a04(3) (July 2000)","key":"2_CR12","DOI":"10.1145\/372346.372369"},{"doi-asserted-by":"crossref","unstructured":"Rosenberg, J., et al.: SIP: Session Initiation Protocol, IETF RFC 3261 (June 2002)","key":"2_CR13","DOI":"10.17487\/rfc3261"},{"doi-asserted-by":"crossref","unstructured":"Dulay, N., Lupu, E., Sloman, M., Damianou, N.: A Policy Deployment Model for the Ponder Language. In: IFIP\/IEEE Symposium on Integrated Network Management, Seattle, USA (2001)","key":"2_CR14","DOI":"10.1109\/INM.2001.918064"},{"doi-asserted-by":"crossref","unstructured":"Bussard, L., Roudier, Y., Kilian-Kehr, R., Crosta, S.: Trust and Authorization in Pervasive B2E Scenarios. In: 6th Information Security Conference, Bristol, UK (October 2003)","key":"2_CR15","DOI":"10.1007\/10958513_23"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,30]],"date-time":"2021-10-30T08:06:48Z","timestamp":1635581208000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}