{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:55:04Z","timestamp":1725494104152},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540767718"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-76772-5_2","type":"book-chapter","created":{"date-parts":[[2007,11,2]],"date-time":"2007-11-02T10:16:26Z","timestamp":1193998586000},"page":"17-32","source":"Crossref","is-referenced-by-count":3,"title":["Context Adapted Certificate Using Morph Template Signature for Pervasive Environments"],"prefix":"10.1007","author":[{"given":"Rachid","family":"Saadi","sequence":"first","affiliation":[]},{"given":"Jean Marc","family":"Pierson","sequence":"additional","affiliation":[]},{"given":"Lionel","family":"Brunie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Shankar, N., Arbaugh, W.: On Trust for Ubiquitous Computing. In: Workshop on Security in Ubiquitous Computing (September 2004)"},{"key":"2_CR2","volume-title":"The Official PGP User\u2019s Guide","author":"P.R. Zimmermann","year":"1995","unstructured":"Zimmermann, P.R.: The Official PGP User\u2019s Guide. MIT Press, Cambridge, MA (1995)"},{"key":"2_CR3","unstructured":"ITU-T Simple public key infrastructure (SPKI) charter, http:\/\/www.ietf.org\/html.charters\/OLD\/spki-charter.html"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Seitz, L., Pierson, J.M., Brunie, L.: Semantic Access Control for Medical Applications in Grid Environments. In: A International Conference on Parallel and Distributed Computing, pp. 374\u2013383 (August 2003)","DOI":"10.1007\/978-3-540-45209-6_56"},{"key":"2_CR5","unstructured":"ITU-T Rec. X.509, ISO\/IEC 9594-8 The Directory: Authentication Framework (2000)"},{"issue":"4","key":"2_CR6","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6","author":"M.R. Thompson","year":"2003","unstructured":"Thompson, M.R., Essiari, A., Mudumbai, S.: Certificate-based authorization policy in a PKI environment. ACM Trans. Inf. Syst. Secur.\u00a06(4), 566\u2013588 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"2_CR7","unstructured":"ITU-T Rec. X.680, ISO\/IEC 8824-1:2002 (2002), http:\/\/asn1.elibel.tm.fr\/en\/standards\/index.htm"},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/3-540-45760-7_16","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"S. Micali","year":"2002","unstructured":"Micali, S., Rivest, L.R.: Transitive Signature Schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 236\u2013243. Springer, Heidelberg (2002)"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1007\/3-540-45760-7_17","volume-title":"Topics in Cryptology - CT-RSA 2002","author":"R. Johnson","year":"2002","unstructured":"Johnson, R., Molnar, D., Song, D., Wagner, D.: Homomorphic signature schemes. In: Preneel, B. (ed.) CT-RSA 2002. LNCS, vol.\u00a02271, pp. 244\u2013262. Springer, Heidelberg (2002)"},{"key":"2_CR10","unstructured":"Brands, S.: A technical Overview of Digital Credentials. Research Report (February 2002)"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/507711.507732","volume-title":"Proceedings of the 7th ACM Symposium on Access Control Models and Technologies","author":"D. Chadwick","year":"2002","unstructured":"Chadwick, D., Otenko, A.: The PERMIS X.509 Role Based Privilege Management Infrastructure. In: Proceedings of the 7th ACM Symposium on Access Control Models and Technologies, pp. 135\u2013140. ACM Press, New York (2002)"},{"key":"2_CR12","unstructured":"Lorch, M., Adams, D., Kafura, D., et al.: The PRIMA System for Privilege Management, Authorization and Enforcement. In: Proceedings of the 4th International Workshop on Grid Computing (November 2003)"},{"key":"2_CR13","unstructured":"Bartel, M., Boyer, J., Fox, B., LaMacchia, B., Simon, E.: XML-encryption syntax and processing. In: W3C Recommendation (February 2002), http:\/\/www.w3.org\/TR\/2002\/REC-xmldsig-core-20020212\/"},{"issue":"4","key":"2_CR14","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1108\/17427370580000132","volume":"1","author":"R. Saadi","year":"2005","unstructured":"Saadi, R., Pierson, J.M., Brunie, L.: (Dis)trust Certification Model for Large Access in Pervasive Environment. JPCC International Journal of Pervasive Computing and Communications\u00a01(4), 289\u2013299 (2005)","journal-title":"JPCC International Journal of Pervasive Computing and Communications"},{"key":"2_CR15","unstructured":"XCBF 1.1, OASIS Standard, (approved August 2003), http:\/\/www.oasis-open.org\/committees\/xcbf\/"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Zhao, M., Smith, S.W., Nicol, D.M.: Aggregated path authentication for efficient BGP security. In: CCS 2005. Proceedings of the 12th ACM Conference on Computer and Communications Security, pp. 128\u2013138 (November 2005)","DOI":"10.1145\/1102120.1102139"},{"key":"2_CR17","unstructured":"Orri, X., Mas, J.M.: SPKI-XML Certificate Structure Internet-Draft, Octalis SA (November 2001), http:\/\/www.ietf.org\/internetdrafts\/draft-orri-spki-xml-cert-struc-00.txt"},{"key":"2_CR18","unstructured":"Challenge-response authentication From Wikipedia, the free encyclopedia, http:\/\/en.wikipedia.org\/wiki\/Challenge-response_authentication"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Steinfeld, R., Bull, L., Zheng, Y.: Content Extraction Signatures. In: Proceedings of 4th International Conference of Information Security and Cryptology, pp. 285\u20132004 (December 2001)","DOI":"10.1007\/3-540-45861-1_22"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Bull, L., Stanski, P., Squire, D.M.: Content extraction signatures using XML digital signatures and custom transforms on-demand. In: Proceedings of the 12th international Conference on World Wide Web, pp. 170\u2013177 (May 2003)","DOI":"10.1145\/775152.775176"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-76772-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:37:56Z","timestamp":1619505476000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-76772-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540767718"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-76772-5_2","relation":{},"subject":[]}}