{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:56:04Z","timestamp":1725558964671},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255215"},{"type":"electronic","value":"9783540320043"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-32004-3_21","type":"book-chapter","created":{"date-parts":[[2010,7,11]],"date-time":"2010-07-11T21:15:56Z","timestamp":1278882956000},"page":"210-224","source":"Crossref","is-referenced-by-count":4,"title":["An Efficient Access Control Model for Mobile Ad-Hoc Communities"],"prefix":"10.1007","author":[{"given":"Sye Loong","family":"Keoh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Emil","family":"Lupu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML-Signature Syntax and Processing (2002)"},{"key":"21_CR2","volume-title":"Bluetooth Connect Without Cables","author":"J. Bray","year":"2000","unstructured":"Bray, J., Sturman, C.: Bluetooth Connect Without Cables. Prentice Hall PTR, Englewood Cliffs (2000)"},{"key":"21_CR3","unstructured":"Ferraiolo, D., Kuhn, R.: Role-Based Access Controls. In: Proceedings of the 15th National Computer Security Conference, pp. 554\u2013563. NIST (1992)"},{"key":"21_CR4","volume-title":"Inside Java 2 Platform Security Architecture, API Design and Implementation","author":"L. Gong","year":"1999","unstructured":"Gong, L.: Inside Java 2 Platform Security Architecture, API Design and Implementation. Addison-Wesley, Reading (1999)"},{"key":"21_CR5","unstructured":"Hebert, J.: The Perf4J API (2002)"},{"key":"21_CR6","first-page":"339","volume-title":"Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology","author":"A. Herzberg","year":"1995","unstructured":"Herzberg, A., Jarecki, S., Krawczyk, H., Yung, M.: Proactive Secret Sharing Or: How to Cope with Perpetual Leakage. In: Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology, pp. 339\u2013352. Springer, Heidelberg (1995)"},{"key":"21_CR7","volume-title":"Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC)","author":"S.L. Keoh","year":"2004","unstructured":"Keoh, S.L., Lupu, E., Sloman, M.: PEACE: A Policy-based Establishment of Ad-hoc Communities. In: Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, USA, December 2004. IEEE Computer Society, Los Alamitos (2004)"},{"key":"21_CR8","unstructured":"M\u00e4ki, S., Aura, T., Hietalahti, M.: Robust Membership Management for Ad-hoc Groups. In: Proceedings of the 5th Nordic Workshop on Secure IT Systems (NORSEC 2000), Reykjavik, Iceland (2000)"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Perrig, A., Canetti, R., Tygar, J.D., Song, D.: The Tesla Broadcast Authentication Protocol. In: RSA Cryptobytes (2002)","DOI":"10.1007\/978-1-4615-0229-6_3"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Perrig, A., Szewczyk, R., Wen, V., Culler, D.E., Tygar, J.D.: SPINS: Security Protocols for Sensor Networks. Mobile Computing and Networking, 189\u2013199 (2001)","DOI":"10.1145\/381677.381696"},{"key":"21_CR11","unstructured":"Rivest, R.L., Lampson, B.: SDSI \u2013 A Simple Distributed Security Infrastructure. Presented at CRYPTO 1996 Rumpsession (1996)"},{"issue":"8","key":"21_CR12","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R.S. Sandhu","year":"1996","unstructured":"Sandhu, R.S., Coyne, E.J.: Role-Based Access Control Models. IEEE Computer\u00a029(8), 38\u201347 (1996)","journal-title":"IEEE Computer"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Saxena, N., Tsudik, G., Yi, J.H.: Admission Control in Peer-to-Peer: Design and Performance Evaluation. In: Proceedings of the First ACM Workshop on Security of Ad-hoc and Sensor Networks (SASN), Fairfax, Virginia, USA (October 2003)","DOI":"10.1145\/986858.986873"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/3-540-44810-1_28","volume-title":"Security Protocols","author":"F. Stajano","year":"2001","unstructured":"Stajano, F.: The Resurrecting Duckling \u2013 What Next(Transcript of Discussion). In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2000. LNCS, vol.\u00a02133, p. 215. Springer, Heidelberg (2001)"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Proceedings of the 7th International Workshop on Security Protocols","author":"F. Stajano","year":"1999","unstructured":"Stajano, F., Anderson, R.J.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Proceedings of the 7th International Workshop on Security Protocols. LNCS. Springer, Heidelberg (1999)"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Zhou, L., Haas, Z.J.: Securing Ad-Hoc Networks. IEEE Network Magazine\u00a013(6) ( November\/December 1999)","DOI":"10.1109\/65.806983"}],"container-title":["Lecture Notes in Computer Science","Security in Pervasive Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-32004-3_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:33:54Z","timestamp":1605760434000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-32004-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255215","9783540320043"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-32004-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}