{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:52:48Z","timestamp":1742993568388,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642042799"},{"type":"electronic","value":"9783642042805"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04280-5_13","type":"book-chapter","created":{"date-parts":[[2009,9,18]],"date-time":"2009-09-18T09:25:31Z","timestamp":1253265931000},"page":"148-160","source":"Crossref","is-referenced-by-count":4,"title":["Empowerment through Electronic Mandates \u2013 Best Practice Austria"],"prefix":"10.1007","author":[{"given":"Thomas","family":"R\u00f6ssler","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/11863908_12","volume-title":"Computer Security \u2013 ESORICS 2006","author":"J. Crampton","year":"2006","unstructured":"Crampton, J., Khambhammettu, H.: Delegation in Role-Based Access Control. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol.\u00a04189, pp. 174\u2013191. Springer, Heidelberg (2006)"},{"issue":"3","key":"13_CR2","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1145\/937527.937530","volume":"6","author":"L. Zhang","year":"2003","unstructured":"Zhang, L., Ahn, G.-J., Chu, B.-T.: A rule-based framework for role-based delegation and revocation. ACM Trans. Inf. Syst. Secur.\u00a06(3), 404\u2013441 (2003)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"13_CR3","unstructured":"Peeters, R., Simoens, K., DeCock, D., Preneel, B.: Cross-Context Delegation through Identity Federation. In: Br\u00f6mme, A., Busch, C., H\u00fchnlein, D. (eds.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures. Lecture Notes in Informatics (LNI) P-137, pp. 79\u201392. Bonner K\u00f6llen Verlag (2008)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. RFC 3281 (2002)","DOI":"10.17487\/rfc3281"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Francis, C., Pinkas, D.: Attribute Certificate (AC) Policies Extension. RFC 4476 (2006)","DOI":"10.17487\/rfc4476"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Leitold, H., Hollosi, A., Posch, R.: Security Architecture of the Austrian Citizen Card Concept. In: Proceedings of ACSAC 2002, pp. 391\u2013400 (2002) ISBN 0-7695-1828-1","DOI":"10.1109\/CSAC.2002.1176311"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"R\u00f6ssler, T.: Giving an interoperable e-ID solution: Using foreign e-IDs in Austrian e-Government. Computer law and security report the bi-monthly report on computer security and the law governing information technology and computer use\u00a024 (2008)","DOI":"10.1016\/j.clsr.2008.07.006"},{"key":"13_CR8","unstructured":"Austrian Federal Law: Federal Act on Electronic Signatures 2001 (Signature law), Austrian Federal Law Gazette, part I, Nr. 190\/1999, 137\/2000, 32\/2001 (2001)"},{"key":"13_CR9","unstructured":"Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. EC Official Journal, L 013, 12\u201320 (2000)"},{"key":"13_CR10","unstructured":"R\u00f6ssler, T., Hollosi, A.: Elektronische Vollmachten - Spezifikation 1.0.0 (May 2006)"},{"key":"13_CR11","unstructured":"Digital-Austria: OID der \u00f6ff. Verwaltung, OID-T1 1.0.0. (February 2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Software Services for e-Business and e-Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04280-5_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T07:21:14Z","timestamp":1739344874000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04280-5_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642042799","9783642042805"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04280-5_13","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}