{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T22:25:33Z","timestamp":1725661533002},"publisher-location":"Berlin, Heidelberg","reference-count":45,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540726784"},{"type":"electronic","value":"9783540726807"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-540-72680-7_17","type":"book-chapter","created":{"date-parts":[[2012,2,20]],"date-time":"2012-02-20T11:24:47Z","timestamp":1329737087000},"page":"343-368","source":"Crossref","is-referenced-by-count":0,"title":["Security for Open Distributed Geospatial Information Systems"],"prefix":"10.1007","author":[{"given":"Andreas","family":"Matheus","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1_17","unstructured":"OASIS: Reference Model for Service Oriented Architecture 1.0, OASIS Standard (2006) \n                  http:\/\/docs.oasis-open.org\/soa-rm\/v1.0\/soa-rm.pdf"},{"key":"17_CR2_17","unstructured":"United States Government Department of the Defense: Trusted Computer System Evaluation Criteria (1985)"},{"key":"17_CR3_17","unstructured":"ISO\/IEC 10181-1:1996, Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Overview \n                  http:\/\/www.iso."},{"key":"17_CR4_17","unstructured":"ISO\/IEC 10181-2:1996, Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Authentication framework \n                  http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=18198"},{"key":"17_CR5_17","unstructured":"ISO\/IEC 10181-3:1996, Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Access control framework \n                  http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=18199"},{"key":"17_CR6_17","unstructured":"ISO\/IEC 10181-4:1996 Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Non-repudiation framework \n                  http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=23615"},{"key":"17_CR7_17","unstructured":"ISO\/IEC 10181-5:1996, Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Confidentiality framework \n                  http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=24329"},{"key":"17_CR8_17","unstructured":"ISO\/IEC 10181-6:1996, Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Integrity framework \n                  http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=24330"},{"key":"17_CR9_17","unstructured":"ISO\/IEC 10181-7:1996, Information technology \u2013 Open Systems Interconnection \u2013 Security frameworks for open systems: Security audit and alarms framework \n                  http:\/\/www.iso.org\/iso\/iso_catalogue\/catalogue_tc\/catalogue_detail.htm?csnumber=18200"},{"key":"17_CR10_17","unstructured":"ISO 7498-2:1989, Information processing systems \u2013 Open Systems Interconnection \u2013 Basic Reference Model \u2013 Part 2: Security Architecture"},{"key":"17_CR11_17","series-title":"MTR-2997 Rev. 1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA023588","volume-title":"Secure Computer Systems: Unified Exposition and Multics Interpretation","author":"DE Bell","year":"1976","unstructured":"D.E.\u00a0Bell, L.J.\u00a0LaPadula: Secure Computer Systems: Unified Exposition and Multics Interpretation, MTR-2997 Rev. 1 (MITRE Corp., Bedford 1976)"},{"key":"17_CR12_17","series-title":"MTR-3153","volume-title":"Integrity Considerations for Secure Computer Systems","author":"KJ Biba","year":"1977","unstructured":"K.J.\u00a0Biba: Integrity Considerations for Secure Computer Systems, MTR-3153 (MITRE Corp., Bedford 1977)"},{"key":"17_CR13_17","unstructured":"IETF RFC 1457: Security Label Framework for the Internet (1993) \n                  http:\/\/tools.ietf.org\/pdf\/rfc1457"},{"key":"17_CR14_17","unstructured":"IETF RFC 3552: Guidelines for Writing RFC Text on Security Considerations (2003) \n                  http:\/\/tools.ietf.org\/pdf\/rfc3552"},{"key":"17_CR15_17","unstructured":"ITU-T: X.200: Information technology \u2013 Open Systems Interconnection \u2013 Basic Reference Model: The basic model (1994) \n                  http:\/\/www.itu.int\/rec\/dologin_"},{"key":"17_CR16_17","unstructured":"IPSec: IP Security \u2013 IETF RFC 4301 (2005) (soboletes RFC 2401 from 1998) \n                  http:\/\/tools.ietf.org\/html\/rfc4301"},{"key":"17_CR17_17","unstructured":"HTTP: IETF RFC 2616 (1999) \n                  http:\/\/tools.ietf.org\/html\/rfc2616"},{"key":"17_CR18_17","unstructured":"SOAP: Simple Object Access Protocol (SOAP), W3C Recommendation, 2nd edn. (2007) \n                  http:\/\/www.w3.org\/TR\/soap\/"},{"key":"17_CR19_17","unstructured":"XML Digital Signature: XML-Signature Syntax and Processing \u2013 W3C Recommendation (2002) \n                  http:\/\/www.w3.org\/TR\/xmldsig-core\/"},{"key":"17_CR20_17","unstructured":"XML Encryption: XML Encryption Syntax and Processing \u2013 W3C Recommendation (2002) \n                  http:\/\/www.w3.org\/TR\/xmlenc-core\/"},{"key":"17_CR21_17","unstructured":"Web Services Security: SOAP Message Security 1.1 (WS-Security 2004) \u2013 OASIS Standard Specification (2006) \n                  http:\/\/www.oasis-open.org\/committees\/download.php\/16790\/wss-v1.1-spec-os-SOAPMessageSecurity.pdf"},{"key":"17_CR22_17","unstructured":"WSDL: Web Services Description Language (WSDL) 1.1, W3C Note (2001) \n                  http:\/\/www.w3.org\/TR\/wsdl"},{"key":"17_CR23_17","unstructured":"WS-Policy: Web Services Policy 1.5 \u2013 Framework, W3C Recommendation (2007) \n                  http:\/\/www.w3.org\/TR\/2007\/REC-ws-policy-20070904\/"},{"key":"17_CR24_17","unstructured":"WS-SecurityPolicy: WS-SecurityPolicy 1.2, OASIS Standard (2007) \n                  http:\/\/docs.oasis-open.org\/ws-sx\/ws-securitypolicy\/200702\/ws-securitypolicy-1.2-spec-os.pdf"},{"key":"17_CR25_17","unstructured":"XACML: eXtensible Access Control Markup Language (XACML) Version 2.0, OASIS Standard (2005) \n                  http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-core-spec-os.pdf"},{"key":"17_CR26_17","unstructured":"XACML RBAC Profile: Core and hierarchical role based access control (RBAC) profile of XACML v2.0, OASIS Standard (2005) \n                  http:\/\/docs.oasis-open.org\/"},{"key":"17_CR27_17","unstructured":"XACML SAML Profile: SAML 2.0 profile of XACML v2.0, OASIS Standard (2005) \n                  http:\/\/docs.oasis-open.org\/xacml\/2.0\/access_control-xacml-2.0-saml-profile-spec-os.pdf"},{"key":"17_CR28_17","unstructured":"GeoXACML: Geospatial eXtensible Access Control Markup Language (GeoXACML) v1.0, Open Geospatial Consortium, Inc. (2008) \n                  http:\/\/portal.opengeospatial.org\/files\/?artifact_id=25218"},{"key":"17_CR29_17","unstructured":"GeoXACML Extension A: Geospatial eXtensible Access Control Markup Language (GeoXACML) Extension A\u00a0\u2013 GML2 Encoding Version 1.0, \n                  http:\/\/portal.opengeospatial.org\/files\/?artifact_id=25219"},{"key":"17_CR30_17","unstructured":"GeoXACML Extension B: Geospatial eXtensible Access Control Markup Language (GeoXACML) Extension B \u2013 GML3 Encoding Version 1.0, \n                  http:\/\/portal.opengeospatial.org\/files\/?artifact_id=25220"},{"key":"17_CR31_17","unstructured":"REL: Information technology \u2013 Multimedia framework (MPEG-21) \u2013 Part 5: Rights Expression Language, ISO\/IEC 21000-5:2004, \n                  http:\/\/www.iso.org\/"},{"key":"17_CR32_17","unstructured":"ODRL: Open Digital Rights Language (ODRL) Version 1.1, W3C Note (2002) \n                  http:\/\/www.w3.org\/TR\/odrl\/"},{"key":"17_CR33_17","unstructured":"XrML: XrML - eXtensible rights Markup Language, ContentGuard, \n                  http:\/\/www.xrml.org\/"},{"key":"17_CR34_17","unstructured":"X.509\/PKI: IETF, Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile (2008) \n                  http:\/\/tools.ietf.org\/html\/rfc5280"},{"key":"17_CR35_17","unstructured":"SAML: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard (2005) \n                  http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf"},{"key":"17_CR36_17","unstructured":"SAML-Bindings: Bindings for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard (2005) \n                  http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-bindings-2.0-os.pdf"},{"key":"17_CR37_17","unstructured":"SAML-Profiles: Profiles for the OASIS Security Assertion Markup Language (SAML) V2.0, OASIS Standard (2005) \n                  http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-profiles-2.0-os.pdf"},{"key":"17_CR38_17","unstructured":"Kerberos: The Kerberos Network Authentication Service (V5) \u2013 IETF RFC 4120 (2005) obsoletes 1510 (1993) \n                  http:\/\/tools.ietf.org\/html\/rfc4120"},{"key":"17_CR39_17","unstructured":"LDAP: Lightweight Directory Access Protocol (LDAP): The Protocol \u2013 IETF RFC 4511 (2006) \n                  http:\/\/tools.ietf.org\/html\/rfc4511"},{"key":"17_CR40_17","unstructured":"IETF: The X.500 String Representation of Standard Attribute Syntaxes: IETF RFC (1993) \n                  http:\/\/tools.ietf.org\/html\/rfc1488"},{"key":"17_CR41_17","unstructured":"WS-Trust: WS-Trust 1.3, OASIS Standard (2007) \n                  http:\/\/docs.oasis-open.org\/ws-sx\/ws-trust\/200512\/ws-trust-1.3-os.pdf"},{"key":"17_CR42_17","unstructured":"D.F.\u00a0Ferraiolo, D.R.\u00a0Kuhn: Role-based access control, 15th Natl. Comput. Secur. Conf. (1992) pp.\u2009554\u2013563, \n                  http:\/\/csrc.nist.gov\/groups\/SNS\/rbac\/documents\/ferraiolo-kuhn-92.pdf"},{"key":"17_CR43_17","unstructured":"OGC: OpenGIS Implementation Specification for Geographic information \u2013 Simple feature access \u2013 Part 1: Common architecture (2006) \n                  http:\/\/portal.opengeospatial.org\/files\/?artifact_id=18241"},{"key":"17_CR44_17","unstructured":"OGC: OpenGIS Geography Markup Language (GML) Implementation Specification, version 2.1.2, \n                  http:\/\/portal.opengeospatial.org\/files\/?artifact_id=11339"},{"key":"17_CR45_17","unstructured":"OGC: OpenGIS Geography Markup Language (GML) Encoding Standard, version 3.2.1, \n                  http:\/\/portal.opengeospatial.org\/files\/?artifact_id=20509"}],"container-title":["Springer Handbook of Geographic Information"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-72680-7_17.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T09:45:07Z","timestamp":1619516707000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-72680-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783540726784","9783540726807"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-72680-7_17","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}