{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T21:05:52Z","timestamp":1742936752627,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540562467"},{"type":"electronic","value":"9783540474883"}],"license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/bfb0013898","type":"book-chapter","created":{"date-parts":[[2005,11,23]],"date-time":"2005-11-23T02:24:15Z","timestamp":1132712655000},"page":"175-189","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Associating metrics to certification paths"],"prefix":"10.1007","author":[{"given":"Anas","family":"Tarah","sequence":"first","affiliation":[]},{"given":"Christian","family":"Huitema","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,9]]},"reference":[{"key":"10_CR1","unstructured":"\u201dTrusted Computer System Evaluation Criteria\u201d, DoD 5200.28-STD Department of Defense, USA, 1985"},{"key":"10_CR2","unstructured":"ISO 7498\u20132. Information Processing Systems \u2014 Open Systems Interconnection \u2014 Basic Reference Model \u2014 Part 2: Security Architecture."},{"key":"10_CR3","unstructured":"ECMA Standard. Security in Open Systems. Data Elements and Service Definitions. Document Version: FINAL of July 1989 (Output of the 12th (Oslo) meeting)."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"R. L. RIVEST, A. SHAMIR, L. ADLEMAN. \u201d A Method for Obtaining Digital Signature and Public Key Crypto-systems\u201d Communications of the ACM February 1978 Vol 21, No2","DOI":"10.1145\/359340.359342"},{"key":"10_CR5","unstructured":"Department of Defense Standard. Trusted Computer System Evaluation Criteria. \u201dOrange Book\u201d. DOD 5200.28-STD of December 1985."},{"key":"10_CR6","unstructured":"ISO-10021, Information Processing System \u2014 Text Communication \u2014 MOTIS (see also: CCITT-X.400-1988 Recommendations)."},{"key":"10_CR7","unstructured":"ISO-9594, Information Processing System \u2014 Open System Interconnection \u2014 The Directory (see also: CCITT-X.500 Recommendations)."},{"key":"10_CR8","unstructured":"C. Huitema, H. Afifi. \u201cSolving Names Within X.500\u201d. INRIA Sophia-Antipolis, Technical report 1991."},{"key":"10_CR9","unstructured":"ISO-9594, Information Processing System \u2014 Open System Interconnection \u2014 The Directory Part 8: Authentication Framework (see also: CCITT-X.509 Recommendations)."},{"key":"10_CR10","unstructured":"CCITT-X.800 Recommendations. Open System Interconnection, Security structure and application security architecture for open systems interconnection."},{"key":"10_CR11","unstructured":"Jennifer G. Steiner, Clifford Neuman, Jeffrey I. Schiller. \u201d Kerberos: An Authentication Service for Open Network Systems\u201d"},{"issue":"No.2","key":"10_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1145\/378570.378623","volume":"20","author":"C. I'Anson","year":"1990","unstructured":"C. I'Anson, C. Mitchell. \u201dSecurity Defects in CCITT Recommendation X.509 \u2014 The Directory Authentication Framework\u201d, ACM Computer Communication Review, VOL. 20, No. 2, April 1990, pp.30\u201334","journal-title":"ACM Computer Communication Review"},{"key":"10_CR13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume-title":"Advances in Cryptology: Proceedings of Crypto'84","author":"A. Shamir","year":"1985","unstructured":"A. Shamir, \u201dIdentity-based Cryptosystem and Signature Scheme\u201d. Advances in Cryptology: Proceedings of Crypto'84, Springer, Berlin 1985, pp. 47\u201353."},{"key":"10_CR14","unstructured":"A. Tarah, C. Huitema, \u201dCHIM\u00c6RA: A Network Security Model\u201d. ESORICS 90, October 24\u201326, 1990, Toulouse, France."},{"key":"10_CR15","unstructured":"A. Tarah, C. Huitema, \u201dCertification and Routing Protocols\u201d, article submitted to the IPPS 92."},{"key":"10_CR16","unstructured":"Kent (BBN). Network Working Group, \u201dPrivacy Enhancement for Internet Electronic Mail: Part II: Certificate-Based Key Management\u201d.Internet Draft."},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"D. Estrin., \u201dPolicy Requirements for Internet Administrative Domain Routing\u201d. Request For Comments 1125. November 1989.","DOI":"10.17487\/rfc1125"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2014 ESORICS 92"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0013898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:04:16Z","timestamp":1559505856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0013898"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540562467","9783540474883"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/bfb0013898","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1992]]},"assertion":[{"value":"9 June 2005","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}