{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:34:14Z","timestamp":1725572054929},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540666820"},{"type":"electronic","value":"9783540479420"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-47942-0_19","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T04:16:22Z","timestamp":1292559382000},"page":"230-243","source":"Crossref","is-referenced-by-count":0,"title":["Boundary Conditions that Influence Decisions about Log File Formats in Multi-application Smart Cards"],"prefix":"10.1007","author":[{"given":"Constantinos","family":"Markantonakis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Bishop, M.: A Standard Audit Log Format. In: Proceedings of the 19th National Information Systems Security Conference, pp. 136\u2013145 (1995), Also available in http:\/\/seclab.cs.ucdavis.edu\/~bishop\/scriv\/index.html"},{"key":"19_CR2","unstructured":"Bishop, M., Wee, C., Frank, J.: Goal Oriented Auditing and Logging. Technical report, Department of Computer Science, Univeristy of California at Davis (1996), Also available in http:\/\/seclab.cs.ucdavis.edu\/~bishop\/scriv\/index.html"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bonyun, D.: The Role of a Well-Defined Auditing Process in the Enforcement of Privacy Policy and Data Security. In: Proceedings of the 1981 IEEE Symposium on Security and Privacy, pp. 19\u201326 (1981)","DOI":"10.1109\/SP.1981.10002"},{"key":"19_CR4","volume-title":"Distributed Systems: Concepts and Design","author":"G. Coulouris","year":"1994","unstructured":"Coulouris, G., Dollimore, J., Kindberg, T.: Distributed Systems: Concepts and Design. Addison-Welsey Publishing Company Inc., London (1994)"},{"key":"19_CR5","unstructured":"Gemplus. GemXpresso Reference Manual, Gemplus (1998)"},{"issue":"2","key":"19_CR6","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1996","unstructured":"Haber, S., Stornetta, W.S.: How to time-stamp a digital document. Journal of Cryptology\u00a03(2), 99\u2013111 (1996)","journal-title":"Journal of Cryptology"},{"key":"19_CR7","unstructured":"Hartel, P., de Jong Frz, E.: Smart cards and card operating systems. In: Conference Proceedings, Int. Conf. UNIFORUM 1996, San-Francisco, California, pp. 725\u2013730 (February 1996)"},{"key":"19_CR8","unstructured":"MAOSCO. MULTOS Reference Manual Ver 1.2. MAOSCO (1998)"},{"key":"19_CR9","unstructured":"MAOSCO. Multos, the smart card gets smarter (July 1998), http:\/\/www.multos.com"},{"key":"19_CR10","unstructured":"Markantonakis, C.: Secure Log File Download Mechanisms for Smart Cards. In: Third Smart Card Research and Advanced Application Conference Cardis 1998. LNCS (September 1998)"},{"key":"19_CR11","unstructured":"Markantonakis, C.: An architecture of Audit Logging in a Multiapplication Smart card Environment. In: EICAR 1999 Conference Proceedings, EICAR 1999 E-Commerce and New Media Managing Safety and Malware Challenges Effectively, Aalborg, Denmark (March 1999), ISBN: 87-98727-0-9"},{"key":"19_CR12","volume-title":"CMS 1999 Communications and Multimedia Security","author":"C. Markantonakis","year":"1999","unstructured":"Markantonakis, C., Xenitellis, S.: Implementation of a Secure Log File Download Manager for the Java Card. In: CMS 1999 Communications and Multimedia Security, Katholieke Universiteit Leuven, Belgium. Kluwer Academic Publishers, Dordrecht (1999)"},{"key":"19_CR13","unstructured":"Sun Microsystems. The Java Card API Ver 2.0 specification (1998), http:\/\/www.javasoft.com\/products\/javacard\/"},{"key":"19_CR14","unstructured":"Sun Microsystems. The Java Card API Ver 2.1 Specification. JavaSoft (1999)"},{"key":"19_CR15","unstructured":"Mondex. Brief description of the mondex log file (1996), http:\/\/www.mondex.com\/mondex\/cgi-bin\/printpage.plenglish+global-technology-security"},{"key":"19_CR16","unstructured":"National Computer Security Center (NCSC). A Guide to Understanding Audit in Trusted Systems. Technical report, Department of Defense (DoD), NCSC-TG-001, Library no. S-228-470 (July 1987)"},{"key":"19_CR17","unstructured":"U.S. Department of Defence. Trusted Computer System Evaluation Criteria. Technical report, U.S Department of Defence, Computer Security Center (December 1985)"},{"key":"19_CR18","unstructured":"International Standard Organisation. ISO\/IEC 7816-5, Information technology - Identification cards - Integrated Circuit(s) Cards with Contacts, Part 5, Numbering System and Registration Procedure for Application Identifiers. International Organization for Standardization (1994)"},{"key":"19_CR19","unstructured":"International Standard Organisation. ISO\/IEC 7816-4, Information technology - Identification cards - Integrated circuits(s) cards with contacts \u2013 Inderindustry Commands for Interchange. International Organization for Standardization (1995)"},{"key":"19_CR20","unstructured":"Schneier, B., Kelsey, J.: Cryptographic Support for Secure Logs on Untrusted Machines. In: The Seventh USENIX Security Symposium Proceedings, pp. 53\u201362. Usenix Press (January 1998)"},{"key":"19_CR21","unstructured":"Simmons, G.J.: Contemporary Cryptology; The Science of Information Integrity. In: Institute of Electrical and Electronic Engineer, Ch.12 (December 1991)"},{"key":"19_CR22","unstructured":"Trane, P., Lecomte, S.: Failure Recovery Using Action Logs for Smart Cards Transactions Based Systems. In: Third IEEE International On-Line Testing Workshop (July 1997)"},{"key":"19_CR23","volume-title":"Third Smart Card Research and Advanced Application Conference - CARDIS 1998","author":"J.-J. Vandewalle","year":"1998","unstructured":"Vandewalle, J.-J., Vetillard, E.: Developing Smart Card Based Applications Using Java Card. In: Third Smart Card Research and Advanced Application Conference - CARDIS 1998. Springer, Heidelberg (1998) (to be published)"}],"container-title":["Lecture Notes in Computer Science","Information and Communication Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-47942-0_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,14]],"date-time":"2020-06-14T19:52:56Z","timestamp":1592164376000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-47942-0_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540666820","9783540479420"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-47942-0_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}