{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:22:01Z","timestamp":1725798121956},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540584209"},{"type":"electronic","value":"9783540487845"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1994]]},"DOI":"10.1007\/bfb0013398","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T07:42:00Z","timestamp":1132731720000},"page":"61-72","source":"Crossref","is-referenced-by-count":0,"title":["Surveillance and protection in IBC management"],"prefix":"10.1007","author":[{"given":"Dimitris","family":"Androutsopoulos","sequence":"first","affiliation":[]},{"given":"Per","family":"Kaijser","sequence":"additional","affiliation":[]},{"given":"Socratis","family":"Katsikas","sequence":"additional","affiliation":[]},{"given":"K\u00e5re","family":"Presttun","sequence":"additional","affiliation":[]},{"given":"Don","family":"Salmon","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Spirakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"7_CR1","unstructured":"ISO10181-7; Open Systems Security Framework \u2014 Security Audit"},{"key":"7_CR2","unstructured":"ISO 7498-2: Information Processing Systems \u2014 Open Systems Interconnection: Basic Reference Model \u2014 Security Architecture, ISO, February 1989"},{"key":"7_CR3","unstructured":"X.509: CCITT Directory \u2014 Authentication Framework"},{"key":"7_CR4","unstructured":"Samson Security Management in a Health-Care Scenario (in these proceedings)"},{"key":"7_CR5","unstructured":"Christmas, P., \u201cNetwork Security Manager\u201d, Elsevier, 1992."},{"key":"7_CR6","unstructured":"P. Spirakis, S. Katsikas, et al. \u201cSecureNet: A Network Oriented Attack Detection and Prevention System\u201d \u2014 Proc. IFTP SEC'94, Cuaracao, May 1994."},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"R. Ostrovsky and M Yung \u201cHow to withstand mobile virus attacks\u201d \u2014 PODC 1991 proc. pgs 51\u201359","DOI":"10.1145\/112600.112605"},{"key":"7_CR8","unstructured":"ALMAP 3.2 SECURITY \u2014 Feasibility Study Draft 01-MAR-94 (Alcatel internal paper)"},{"key":"7_CR9","unstructured":"ITU Recommendation M.3010 \u2014 Principles for a TMN"},{"key":"7_CR10","unstructured":"ISO 10181-3: Access Control Framework"},{"key":"7_CR11","unstructured":"Generic Security Services Application Program Interface (GSS-API) \u2014 Security Attribute and Delegation Extensions; X\/open S.307"},{"key":"7_CR12","unstructured":"GSS-API; X\/Open P.308"},{"key":"7_CR13","unstructured":"ACTS Workplan, Draft 4 \u2014 Background Material, 26 May 1994; DGXIII-B (draft material for consultation)"}],"container-title":["Lecture Notes in Computer Science","Towards a Pan-European Telecommunication Service Infrastructure \u2014 IS&amp;N '94"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T04:37:31Z","timestamp":1586579851000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013398"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994]]},"ISBN":["9783540584209","9783540487845"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/bfb0013398","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1994]]}}}