{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:56:32Z","timestamp":1725562592707},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642147050"},{"type":"electronic","value":"9783642147067"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14706-7_13","type":"book-chapter","created":{"date-parts":[[2010,8,11]],"date-time":"2010-08-11T09:14:43Z","timestamp":1281518083000},"page":"169-182","source":"Crossref","is-referenced-by-count":0,"title":["Credentials Management for High-Value Transactions"],"prefix":"10.1007","author":[{"given":"Glenn","family":"Benson","sequence":"first","affiliation":[]},{"given":"Shiu-Kai","family":"Chin","sequence":"additional","affiliation":[]},{"given":"Sean","family":"Croston","sequence":"additional","affiliation":[]},{"given":"Karthick","family":"Jayaraman","sequence":"additional","affiliation":[]},{"given":"Susan","family":"Older","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Vedamuthu, A.S., Orchard, D., Hirsch, F., Hondo, M., Yendluri, P., Boubez, T.: Yal\u00e7inalp, \u00dc.: Web services policy 1.5 - framework (September 2007), http:\/\/www.w3.org\/TR\/ws-policy\/"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Myers, M., Ankney, R., Malpani, A., Galperin, S., Adams, C.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol - OCSP. In: RFC 2560 (Proposed Standard) (June 1999)","DOI":"10.17487\/rfc2560"},{"issue":"3","key":"13_CR3","doi-asserted-by":"publisher","first-page":"751","DOI":"10.1016\/j.comnet.2006.06.004","volume":"51","author":"G. Benson","year":"2007","unstructured":"Benson, G.: Portable security transaction protocol. Comput. Netw.\u00a051(3), 751\u2013766 (2007)","journal-title":"Comput. Netw."},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, A.H.: An introduction to the web services policy language (wspl). In: POLICY (2004)","DOI":"10.1109\/POLICY.2004.1309166"},{"key":"13_CR5","unstructured":"Cranor, L., Dobbs, B., Egelman, S., Hogben, G., Humphrey, J., Langheinrich, M., Marchiori, M., Presler-Marshall, M., Reagle, J., Schunter, M., Stampley, D.A., Wenning, R.: The platform for privacy preferences 1.1 (p3p1.1) specification. (November 2006), http:\/\/www.w3.org\/TR\/P3P11\/"},{"key":"13_CR6","unstructured":"Olnes, J.: DNV VA white paper: PKI interoperability by an independent, trusted validation authority. In: 5th Annual PKI R & D Workshop (April 2006)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Fox, B., LaMacchia, B.A.: Online certificate status checking in financial transactions: The case for re-issuance. In: FC (1999)","DOI":"10.1007\/3-540-48390-X_8"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Abadi, M.: Logic in access control (tutorial notes), 145\u2013165 (2009)","DOI":"10.1007\/978-3-642-03829-7_5"},{"issue":"4","key":"13_CR9","doi-asserted-by":"publisher","first-page":"706","DOI":"10.1145\/155183.155225","volume":"15","author":"M. Abadi","year":"1993","unstructured":"Abadi, M., Burrows, M., Lampson, B., Plotkin, G.: A Calculus for Access Control in Distributed Systems. ACM Transactions on Programming Languages and Systems\u00a015(4), 706\u2013734 (1993)","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Chin, S.K., Older, S.: Reasoning about delegation and account access in retail payment systems. In: MMM-ACNS (2007)","DOI":"10.1007\/978-3-540-73986-9_8"}],"container-title":["Lecture Notes in Computer Science","Computer Network Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14706-7_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:56:33Z","timestamp":1606186593000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14706-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642147050","9783642147067"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14706-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}