{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T14:40:03Z","timestamp":1740840003348,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540408086"},{"type":"electronic","value":"9783540452294"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-45229-4_9","type":"book-chapter","created":{"date-parts":[[2011,1,7]],"date-time":"2011-01-07T05:58:04Z","timestamp":1294379884000},"page":"84-93","source":"Crossref","is-referenced-by-count":1,"title":["The ET-RBAC Based Privilege Management Infrastructure for Wireless Networks"],"prefix":"10.1007","author":[{"given":"Dong-Gue","family":"Park","sequence":"first","affiliation":[]},{"given":"You-Ri","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","unstructured":"Arsenault, A., Turner, S.: Internet X.509 Public Key Infrastructure PKIX Roadmap Work in Progress. Internet-draft (March 05 2000), http:\/\/www.ietf.org\/internet-drafts\/draft-ietf-pkix-roadmap-05.txt"},{"key":"9_CR2","volume-title":"Understanding Public-Key Infrastructure: Concepts, Standards and Deployment Considerations\u00ed\u00ed","author":"C. Adams","year":"1999","unstructured":"Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure: Concepts, Standards and Deployment Considerations\u00ed\u00ed. Macmillan Technical Publishing, Basingstoke (1999)"},{"key":"9_CR3","unstructured":"Rec, I.T.U.-T.: X.509 2000 |ISO\/IEC 9594-8 The Directory: Authentication Framework"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Housley, R., Ford, W., Polk, T., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and CRL Profile. RFC 2459, IETF PKIX Working Group (January 1999), http:\/\/www.ietf.org\/rfc\/rfc2459.txt","DOI":"10.17487\/rfc2459"},{"key":"9_CR5","unstructured":"Aresenault, A., Tuner, S.: Internet X.509 Public Key Infrastructure, Internet Draft (November 2000)"},{"key":"9_CR6","unstructured":"Lee, J.I., Park, J.H., Song, J.S.: Domestic PKI model for WAP. Institute of Information Security & Cryptology Journal (October 2000)"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Wireless Application Protocol Wireless Transport Layer Security, WAP Forum (April 6 2001)","DOI":"10.1049\/cp:20010502"},{"key":"9_CR8","unstructured":"Jin, S.H., Choi, D.S., Cho, Y.S., Yoon, E.J.: Attribute Authentication technology & PMI. Institute of Information Security & Cryptology Journal (December 2000)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, Internet Draft (June 2001)","DOI":"10.17487\/rfc3281"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, RFC 3281 (April 2002), available on line at http:\/\/www.ietf.org\/rfc\/rfc3281.txt","DOI":"10.17487\/rfc3281"},{"key":"9_CR11","unstructured":"ISO\/IEC 9594-8\/ITU-T Recommendation X.509, Information Technology-Open System Interconnection: The Directory: Authentication Framework (2002)"},{"key":"9_CR12","unstructured":"Park, D.G., Hwang, Y.D.: RBAC in Distributed Retrieving Systems by Attribute Certificates. In: IC 2001 (2001)"},{"key":"9_CR13","unstructured":"Knight, S., Grandy, C.: Scalability Issues in PMI Delegation. In: 1st Annual PKI Research Workshop-proceedings (April 2002)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Park, J.S., Sandhu, R.: Binding Identities and Attributes Using Digitally Signed Certificates. In: ACSAC 2000 (2000)","DOI":"10.1109\/ACSAC.2000.898865"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Chadwick, D.W., Otenko, O.: The PERMIS X.509 Role based Privilege Management Infrastructure. In: SACMAT 2002 (2002)","DOI":"10.1145\/507711.507732"},{"key":"9_CR16","unstructured":"Chadwick, D.W., Otenko, A.: RBAC Polices in XML for X.509 based Privilege Management. In: Sec 2000 (2000)"},{"key":"9_CR17","unstructured":"Chadwick, D.W.: Privilege Management Infrastructure. Business Briefing: Global Security Systems Reference Section"},{"key":"9_CR18","unstructured":"Park, D.G., Lee, Y.R.: The PMI model for the wireless environment. In: KOCIES Conference 2002 (2002)"},{"key":"9_CR19","unstructured":"Nykanen, T.: Attribute Certificate in X.509. In: HUT TML 2000, Tik-110.501 Seminar on Network Security (2000)"},{"key":"9_CR20","unstructured":"Park, D.G., Hwang, Y.D.: A Extended Task-Role-Based access control model for access control enforcement in Enterprise Environments. In: EALPIIT 2002 (2002)"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-45229-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,1]],"date-time":"2025-03-01T13:53:10Z","timestamp":1740837190000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-45229-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540408086","9783540452294"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-45229-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}