{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:11:20Z","timestamp":1725718280175},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_48","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T11:14:54Z","timestamp":1362395694000},"page":"441-446","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Privacy Protection in Distributed Environments through Identification and Authentication-Based Secure Data-Level Access Control"],"prefix":"10.1007","author":[{"given":"Nisreen Alam","family":"Aldeen","sequence":"first","affiliation":[]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"48_CR1","doi-asserted-by":"crossref","unstructured":"Burnap, P., Hilton, J.: Self Protecting Data for De-perimeterised Information Sharing. In: Third International Conference on Digital Society. Cardiff School of Computer Science. Cardiff University (2009)","DOI":"10.1109\/ICDS.2009.41"},{"key":"48_CR2","doi-asserted-by":"crossref","unstructured":"Burnap, P., Hilton, J., Tawileh, A.: Self-Protecting Information for De-perimeterised Electronic Relationships (SPIDER), Final Report (July 30, 2009)","DOI":"10.1109\/ICDS.2009.41"},{"key":"48_CR3","unstructured":"van Clee, A., Wieringa, R.: De-perimeterisation as a cycle: tearing down and rebuilding security perimeters. (December 5, 2008)"},{"key":"48_CR4","unstructured":"Olovsson, T.: CTO, The Road to Jericho and the myth of Fortress Applications, AppGate Network Security, Appgate (2007)"},{"key":"48_CR5","unstructured":"Olovsson, T.: Surviving in a hostile world, The myth of fortress applications, CTO, Appgate, Jericho Forum, Professor at Goteborg University (2007)"},{"key":"48_CR6","unstructured":"Palmer, G.: De-Perimeterisation: Benefits and limitations, Network and Security, Siebel Systems Ltd., Siebel Centre, The Glanty, Egham, Surrey TW20 9DW, United Kingdom (2005)"},{"key":"48_CR7","unstructured":"Simmonds, P.: Architectures for a Jericho Environment, Global Information Security Director, ICI Information Security (2004)"},{"issue":"2","key":"48_CR8","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1145\/505586.505590","volume":"5","author":"E. Damiana","year":"2002","unstructured":"Damiana, E., De Cabitani Di Vimercati, S., Paraboschi, S., Samarati, P.: A Fine-Grained Access Control System for XML Documents. ACM Transactions on Information and System Security\u00a05(2), 169\u2013202 (2002)","journal-title":"ACM Transactions on Information and System Security"},{"key":"48_CR9","doi-asserted-by":"crossref","unstructured":"Bertino, E., Castano, S.: On Specifying Security Policies for Web Documents with an XML-based Language (2001)","DOI":"10.1145\/373256.373264"},{"key":"48_CR10","unstructured":"ITU-T Recommendation X.509, ISO\/IEC 9594-8, Information Technology \u2013 Open Systems Interconnection- The Directory: Authentication Framework (1997)"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T10:02:20Z","timestamp":1557568940000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}