{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:08:31Z","timestamp":1725491311637},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540743767"},{"type":"electronic","value":"9783540743774"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74377-4_48","type":"book-chapter","created":{"date-parts":[[2007,9,12]],"date-time":"2007-09-12T01:38:34Z","timestamp":1189561114000},"page":"451-459","source":"Crossref","is-referenced-by-count":1,"title":["Enhanced Security Scheme for Managing Heterogeneous Server Platforms"],"prefix":"10.1007","author":[{"given":"Jiho","family":"Kim","sequence":"first","affiliation":[]},{"given":"Duhyun","family":"Bae","sequence":"additional","affiliation":[]},{"given":"Sehyun","family":"Park","sequence":"additional","affiliation":[]},{"given":"Ohyoung","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","unstructured":"ITU-T Recommendation X.509: Information Technology - Open systems interconnection - The directory: public-key and attribute certificate frameworks (2002)"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Housley, R., e.a.: RFC3280 - Internet X.509 Public Key Infrastructure Certificate and CRL Profile (2002)","DOI":"10.17487\/rfc3280"},{"key":"48_CR3","doi-asserted-by":"crossref","unstructured":"Perlman, R.: An overview of PKI Trust Models. IEEE Network 13 (1999)","DOI":"10.1109\/65.806987"},{"key":"48_CR4","unstructured":"Malpani, A., e.a: Simple Certificate Validation Protocol (SCVP) (2002)"},{"key":"48_CR5","unstructured":"Levi A., Caglayan, M. U.: An efficient, dynamic and trust preserving public key infrastructure. In: Proceedings of IEEE Symposium on Security and Privacy (2000)"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74377-4_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T21:43:17Z","timestamp":1558474997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74377-4_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540743767","9783540743774"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74377-4_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}