{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:34:56Z","timestamp":1725528896329},"publisher-location":"Wiesbaden","reference-count":18,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-8348-9283-6_16","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T11:17:39Z","timestamp":1236338259000},"page":"152-162","source":"Crossref","is-referenced-by-count":2,"title":["Towards real Interoperable, real Trusted Network Access Control: Experiences from Implementation and Application of Trusted Network Connect"],"prefix":"10.1007","author":[{"given":"Josef","family":"von Helden","sequence":"first","affiliation":[]},{"given":"Ingo","family":"Bente","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Home of EMSCB project: http:\/\/www.emscb.com\/"},{"key":"16_CR2","unstructured":"Home of FreeRADIUS: http:\/\/freeradius.org\/"},{"key":"16_CR3","unstructured":"TCG Trusted Network Connect, TNC IF-IMC. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.2, Revision 8, 05 February 2007, Published"},{"key":"16_CR4","unstructured":"TCG Trusted Network Connect, TNC IF-IMV. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.2, Revision 8, 05 February 2007, Published"},{"key":"16_CR5","unstructured":"TCG Trusted Network Connect, TNC IF-MAP binding for SOAP. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.0, Revision 25, 28 April 2008, Published"},{"key":"16_CR6","unstructured":"TCG Trusted Network Connect, TNC IF-PEP: Protocol Bindings for RADIUS. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/.Specification Version 1.1, Revision 0.7, 05 February 2007, Published"},{"key":"16_CR7","unstructured":"TCG Infrastructure Working Group, Platform Trust Services Interface Specification (IF-PTS). In: https:\/\/www.trustedcomputinggroup.org\/specs\/IWG\/. Specification Version 1.0, Revision 1.0, 17 November 2006, FINAL"},{"key":"16_CR8","unstructured":"TCG Trusted Network Connect, TNC IF-TNCCS: Protocol Bindings for SoH. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.0, Revision 0.08, 21 May 2007, Published"},{"key":"16_CR9","unstructured":"TCG Trusted Network Connect, TNC IF-T: Protocol Bindings for Tunneled EAP Methods. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.1, Revision 10, 21 May 2007, Published"},{"key":"16_CR10","unstructured":"TCG Trusted Network Connect, TNC IF-TNCCS. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.1, Revision 1.00, 05 February 2007, Published"},{"key":"16_CR11","unstructured":"Home of Project libtnc: http:\/\/sourceforge.net\/projects\/libtnc"},{"key":"16_CR12","unstructured":"Pohlmann Norbert, Integrity Check of Remote Computer Systems \u2014 Trusted Network Connect. In: ISSE 2007, http:\/\/www.internet-sicherheit.de\/fileadmin\/docs\/publikationen\/isse-2007-trusted-networkconnect-pohlmann_21_09_07.pdf"},{"key":"16_CR13","unstructured":"Roecher Dror-John, Thumann Michael, NACATTACK. In: Black Hat Europe 2007, http:\/\/www.blackhat.com\/html\/bh-europe-07\/bh-eu-07-speakers.html"},{"key":"16_CR14","unstructured":"Symantec Global Internet Security Threat Report, Trends for July-December 07. In: http:\/\/www.symantec.com\/business\/theme.jsp?themeid=threatreport. Volume XII, Published April 2008"},{"key":"16_CR15","unstructured":"TCG Trusted Network Connect, TNC Architecture for Interoperability. In: https:\/\/www.trustedcomputinggroup.org\/specs\/TNC\/. Specification Version 1.3, Revision 6, 28 April 2008, Published"},{"key":"16_CR16","unstructured":"Homepage of TNC@FHH: http:\/\/tnc.inform.fh-hannover.de"},{"key":"16_CR17","unstructured":"Homepage of wpa_supplicant: http:\/\/hostap.epitest.fi\/wpa_supplicant\/"},{"key":"16_CR18","unstructured":"Homepage of XSupplicant: http:\/\/open1x.sourceforge.net\/"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,6]],"date-time":"2019-03-06T07:03:04Z","timestamp":1551855784000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783834806604","9783834892836"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_16","relation":{},"subject":[],"published":{"date-parts":[[2009]]}}}