{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:03Z","timestamp":1725558963924},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_15","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T17:15:56Z","timestamp":1278868556000},"page":"134-150","source":"Crossref","is-referenced-by-count":9,"title":["Supporting Dynamically Changing Authorizations in Pervasive Communication Systems"],"prefix":"10.1007","author":[{"given":"Adam J.","family":"Lee","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jodie P.","family":"Boyer","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chris","family":"Drexelius","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Prasad","family":"Naldurg","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Raquel L.","family":"Hill","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Roy H.","family":"Campbell","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"15_CR1","doi-asserted-by":"crossref","unstructured":"Kohl, J., Neuman, B.C.: The Kerberos Network Authentication Service (Version 5). Internet Request for Comments RFC-1510 (1993)","DOI":"10.17487\/rfc1510"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/35.312841","volume":"32","author":"B.C. Neuman","year":"1994","unstructured":"Neuman, B.C., Ts\u2019o, T.: Kerberos: An Authentication Service for Computer Networks. IEEE Communications\u00a032, 33\u201338 (1994)","journal-title":"IEEE Communications"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Housely, R., Ford, W., Polk, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. Internet Request for Comments RFC-2459 (1999)","DOI":"10.17487\/rfc2459"},{"key":"15_CR4","unstructured":"Public key infrastructure study. National Institute of Standards and Technology (1994)"},{"key":"15_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-540-39881-3_12","volume-title":"Security in Pervasive Computing","author":"S. Creese","year":"2003","unstructured":"Creese, S., Goldsmith, M., Rosco, B., Zakiuddin, I.: Authentication for pervasive computing. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, pp. 116\u2013129. Springer, Heidelberg (2003)"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Roman, M., Hess, C.K., Cerqueira, R., Ranganathan, A., Campbell, R.H., Nahrstedt, K.: Gaia: A middleware infrastructure to enable active spaces. IEEE Pervasive Computing, 74\u201383 (2002)","DOI":"10.1109\/MPRV.2002.1158281"},{"key":"15_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5609-1","volume-title":"Practical Intranet Security: Overview of the State of the Art and Available Technologies.","author":"P. Ashley","year":"1999","unstructured":"Ashley, P., Vandenwauver, M.: Practical Intranet Security: Overview of the State of the Art and Available Technologies. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"15_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/3-540-49135-X_9","volume-title":"Security Protocols","author":"M. Blaze","year":"1999","unstructured":"Blaze, M., Feigenbaum, J., Keromytis, A.D.: KeyNote: Trust management for public-key infrastructures. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol.\u00a01550, pp. 59\u201363. Springer, Heidelberg (1999)"},{"key":"15_CR9","unstructured":"Rivest, R.L., Lampson, B.: SDSI \u2013 A simple distributed security infrastructure. Presented at CRYPTO 1996 Rumpsession (1996)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., K\u00f6hntopp, M.: Anonymity, unobservability, and pseudonymity: A proposal for terminology (2000)","DOI":"10.1007\/3-540-44702-4_1"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Vandenwauver, M., Govaerts, R., Vandewalle, J.: How role based access control is implemented in sesame. In: WETICE, pp. 293\u2013298 (1997)","DOI":"10.1109\/ENABL.1997.630828"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Hill, R., Al-Muhtadi, J., Campbell, R., Kapadia, A., Naldurg, P., Ranganathan, A.: A middleware architecture for securing ubiquitous computing cyber infrastructures. In: 5th ACM\/IFIP\/USENIX International Middleware Conference (2004)","DOI":"10.1109\/MDSO.2004.21"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Creese, S., Goldsmith, M., Roscoe, B., Zakiuddin, I.: Authentication for pervasive computing. In: Security in Pervasive Computing (2003)","DOI":"10.1007\/978-3-540-39881-3_12"},{"key":"15_CR14","unstructured":"Wullems, C., Looi, M., Clark, A.: Towards context- aware security: An authorization architecture for intranet environments. In: The proceedings of the Second IEEE Conference on Pervasive Computing and Communciations Worshops (2004)"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Sampemane, G., Naldurg, P., Campbell, R.H.: Access control for active spaces. In: Annual Computer Security Applications Conference (2002)","DOI":"10.1109\/CSAC.2002.1176306"},{"key":"15_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/74850.74852","volume-title":"Proceedings of the twelfth ACM symposium on Operating systems principles","author":"M. Burrows","year":"1989","unstructured":"Burrows, M., Abadi, M., Needham, R.: A logic of authentication. In: Proceedings of the twelfth ACM symposium on Operating systems principles, pp. 1\u201313. ACM Press, New York (1989)"},{"key":"15_CR17","doi-asserted-by":"publisher","first-page":"444","DOI":"10.1109\/TSE.2003.1199073","volume":"29","author":"D.A. McGrew","year":"2003","unstructured":"McGrew, D.A., Sherman, A.T.: Key establishment in large dynamic groups using one-way function trees. IEEE Transactions on Software Engineering\u00a029, 444\u2013458 (2003)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Mittra, S.: Iolus: A framework for scalable secure multicasting. In: ACM SIGCOMM (1997)","DOI":"10.1145\/263105.263179"},{"key":"15_CR19","unstructured":"Perrig, A.: Efficient collaborative key management protocols for secure autonomous group communication. In: International Workshop on Cryptographic Techniques and E-Commerce CrypTEC (1999)"},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Steiner, M., Tsudik, G., Waidner, M.: Cliques: A new approach to group key agreement. In: 18th International Conference on Distributed Computing Systems (ICDCS 1998), pp. 380\u2013387 (1998)","DOI":"10.1109\/ICDCS.1998.679745"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_15.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:33:51Z","timestamp":1605742431000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}