{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:11:34Z","timestamp":1725495094761},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540771555"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77156-2_39","type":"book-chapter","created":{"date-parts":[[2007,11,14]],"date-time":"2007-11-14T12:48:44Z","timestamp":1195044524000},"page":"315-321","source":"Crossref","is-referenced-by-count":2,"title":["Anonymous Context Based Role Activation Mechanism"],"prefix":"10.1007","author":[{"given":"Partha","family":"Das Chowdhury","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Christianson","sequence":"additional","affiliation":[]},{"given":"James","family":"Malcolm","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","unstructured":"Belokosztolszki, A.: Role based access control policy administration. Technical Report 586, University of Cambridge (2004)"},{"key":"39_CR2","unstructured":"Beresnevichiene, Y.: A role and context based security model. Technical Report 558, University of Cambridge (2003)"},{"key":"39_CR3","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions In Cryptography. IEEE Transactions on Information Theory\u00a022, 472\u2013492 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"39_CR4","doi-asserted-by":"crossref","unstructured":"Ferraiolo, D., Sandhu, R., Gavrilla, S., Kuhn, R., Chandramouli, R.: Proposed NIST Standard For Role Based Access Control. ACM Transactions on Information and Systems Security\u00a04(3), 224\u2013274","DOI":"10.1145\/501978.501980"},{"key":"39_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1007\/BF02351718","volume":"1","author":"K. McKurley","year":"1988","unstructured":"McKurley, K.: A Key Distribution System Equal to Factoring. Journal of Cryptology\u00a01, 95\u2013105 (1988)","journal-title":"Journal of Cryptology"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Neuman, B.C., Tso\u2019s, T.: Kerberos: An Authentication Service For Computer Networks. IEEE Communications\u00a032(9), 33\u201338","DOI":"10.1109\/35.312841"},{"key":"39_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology - ASIACRYPT 2001","author":"R. Rivest","year":"2001","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How To Leak A Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol.\u00a02248, pp. 552\u2013565. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77156-2_39.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T11:03:35Z","timestamp":1619521415000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77156-2_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540771555"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77156-2_39","relation":{},"subject":[]}}