{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T21:15:13Z","timestamp":1743110113564,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540201854"},{"type":"electronic","value":"9783540451846"}],"license":[{"start":{"date-parts":[[2003,1,1]],"date-time":"2003-01-01T00:00:00Z","timestamp":1041379200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45184-6_5","type":"book-chapter","created":{"date-parts":[[2010,6,28]],"date-time":"2010-06-28T00:09:02Z","timestamp":1277683742000},"page":"54-64","source":"Crossref","is-referenced-by-count":0,"title":["Towards an IPv6-Based Security Framework for Distributed Storage Resources"],"prefix":"10.1007","author":[{"given":"Alessandro","family":"Bassi","sequence":"first","affiliation":[]},{"given":"Julien","family":"Laganier","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Deeringr, S., Hinden, B.: Internet Protocol version 6 (IPv6) Specification. RFC 2460 (December 1995)","DOI":"10.17487\/rfc1883"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Security Architecture for the Internet Protocol. RFC 2401 (November 1998)","DOI":"10.17487\/rfc2401"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: IP Authentication Header. RFC 2402 (November 1998)","DOI":"10.17487\/rfc2402"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Kent, S., Atkinson, R.: Encapsulating Security Payload. RFC 2403 (November 1998)","DOI":"10.17487\/rfc2406"},{"key":"5_CR5","unstructured":"Dierks, T., Allen, C.: The Tranport Layer Security (TLS) Protocol. RFC 2246 (January 1999)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Ellison, C., et al.: SPKI Certificate Theory. RFC 2693 (September 1999)","DOI":"10.17487\/rfc2693"},{"key":"5_CR7","unstructured":"Montenegro, G., Castellucia, C.: Stastically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses. In: 9th Network and Distributed System Security Symposium (NDSS) (February 2002)"},{"key":"5_CR8","unstructured":"Montenegro, G., Castellucia, C.: Securing Group Management. ACM Transactions on Security. (T-SEC) 2002 (February 2001)"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Plank, J., Bassi, A., Beck, M., et al.: Managing Data Storage in the Network. IEEE Internet Computing (September-October 2001)","DOI":"10.1109\/4236.957895"},{"key":"5_CR10","unstructured":"Montenegro, G., Bailly, D.: The Crypto-ID JXTA project web site, http:\/\/cryptoid.jxta.org"},{"key":"5_CR11","unstructured":"The Globus project web site, http:\/\/www.globus.org"},{"key":"5_CR12","unstructured":"Goh, E., Shacham, H., Modadugu, N., Boneh, D.: SiRIUS: Securing Remote Untrusted Storage. In: Proc. Network and Distributed System Security Symposium (NDSS) (February 2003)"},{"key":"5_CR13","unstructured":"Ioannidis, J., Keromytis, A., et al.: Trust Management for IPsec. In: Proc. Network and Distributed System Security Symposium (NDSS) (February 2001)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Ioannidis, J., Keromytis, A., et al.: Implementing a Distributed Firewall. In: Proc. ACM Conference on Computer and Communications Security (2000)","DOI":"10.1145\/352600.353052"}],"container-title":["Lecture Notes in Computer Science","Communications and Multimedia Security. Advanced Techniques for Network and Data Protection"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45184-6_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:38:08Z","timestamp":1559209088000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45184-6_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540201854","9783540451846"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45184-6_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}