{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:50:15Z","timestamp":1725501015201},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540744085"},{"type":"electronic","value":"9783540744092"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74409-2_27","type":"book-chapter","created":{"date-parts":[[2007,8,17]],"date-time":"2007-08-17T11:57:55Z","timestamp":1187351875000},"page":"248-258","source":"Crossref","is-referenced-by-count":0,"title":["X316 Security Toolbox for New Generation of Certificate"],"prefix":"10.1007","author":[{"given":"Rachid","family":"Saadi","sequence":"first","affiliation":[]},{"given":"Jean Marc","family":"Pierson","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Brunie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge, MA, USA (1995)"},{"key":"27_CR2","unstructured":"ITU-T Simple public key infrastructure (SPKI) charter, http:\/\/www.ietf.org\/html.charters\/OLD\/spki-charter.html"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Seitz, L., Pierson, J.M., Brunie, L.: Semantic Access Control for Medical Applications in Grid Environments. In: A International Conference on Parallel and Distributed Computing, pp. 374\u2013383 (August 2003)","DOI":"10.1007\/978-3-540-45209-6_56"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Adams, C., Farrell, S.: RFC 2510: Internet X.509 Public Key Infrastructure: Certificate Management Protocols (March 1999)","DOI":"10.17487\/rfc2510"},{"key":"27_CR5","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6, 4","author":"M.R. Thompson","year":"2003","unstructured":"Thompson, M.R., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur.\u00a06, 4, 566\u2013588 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"27_CR6","unstructured":"ITU-T Rec. X.680, ISO\/IEC 8824-1:2002 (2002), http:\/\/asn1.elibel.tm.fr\/en\/standards\/index.htm"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Micali, S., Rivest, R.: Transitive Signature Schemes. In: Proceedings of the the Cryptographer\u2019s Track At the RSA Conference on Topics in Cryptology, Computer Science, February 2003, vol.\u00a02271, pp. 236\u2013243 (2003)","DOI":"10.1007\/3-540-45760-7_16"},{"key":"27_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R. Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"27_CR9","unstructured":"Brands, S.: A technical Overview of Digital Credentials. Research Report (February 2002)"},{"key":"27_CR10","first-page":"135","volume-title":"Proceedings of the 7th ACM Symposium on Access Control Models and Technologies","author":"D. Chadwick","year":"2002","unstructured":"Chadwick, D., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, June 2002, pp. 135\u2013140. ACM Press, New York (2002)"},{"key":"27_CR11","unstructured":"Lorch, M., Adams, D., Kafura, D., et al.: The PRIMA System for Privilege Management, Authorization and Enforcement. In: Proceedings of the 4th International Workshop on Grid Computing (November 2003)"},{"key":"27_CR12","unstructured":"Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML-encryption syntax and processing. In: W3C Recommendation (February 2002), http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/"},{"issue":"4","key":"27_CR13","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1108\/17427370580000132","volume":"1","author":"R. Saadi","year":"2005","unstructured":"Saadi, R., Pierson, J.M., Brunie, L.: (Dis)trust Certification Model for Large Access in Pervasive Environment. JPCC International Journal of Pervasive Computing and Communications\u00a01(4), 289\u2013299 (2005)","journal-title":"JPCC International Journal of Pervasive Computing and Communications"},{"key":"27_CR14","doi-asserted-by":"crossref","unstructured":"Saadi, R., Pierson, J.M., Brunie, L.: Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments. In: Proceedings of the International Conference in Grid and Pervasive Computing (to appear, 2007)","DOI":"10.1007\/978-3-540-72360-8_30"},{"key":"27_CR15","unstructured":"Imamura, T., Dillaway, B., Simon, E.: XML-signature syntax and processing. In: W3C Recommendation (December 2002), http:\/\/www.w3.org\/TR\/2002\/REC-xmlenc-core-20021210\/"},{"key":"27_CR16","unstructured":"Orri, X., Mas, J.M.: SPKI-XML Certificate Structure Internet-Draft, Octalis SA (November 2001), http:\/\/www.ietf.org\/internetdrafts\/draft-orri-spki-xml-cert-struc-00.txt"},{"key":"27_CR17","unstructured":"Challenge-response authentication From Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Challenge-response_authentication"},{"key":"27_CR18","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Zheng, Y.: Content Extraction Signatures. In: Proceedings of 4th International Conference of Information Security and Cryptology, December 2001, pp. 285\u20132004 (2001)","DOI":"10.1007\/3-540-45861-1_22"},{"key":"27_CR19","doi-asserted-by":"crossref","unstructured":"Bull, L., Stanski, P., Squire, D.M.: Content extraction signatures using XML digital signatures and custom transforms on-demand. In: Proceedings of the 12th international Conference on World Wide Web, May 2003, pp. 170\u2013177 (2003)","DOI":"10.1145\/775152.775176"},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Ejigu, D., Scuturici, M., Brunie, L.: CoCA: A Collaborative Context-Aware Service Platform for Pervasive Computing. In: The proceedings of the IEEE\/CS International Conference on Information Technology: New Generations (to appear, May 2007)","DOI":"10.1109\/ITNG.2007.49"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74409-2_27.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:25:17Z","timestamp":1619504717000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74409-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540744085","9783540744092"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74409-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}