{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:25:54Z","timestamp":1725456354755},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540640400"},{"type":"electronic","value":"9783540696889"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0028159","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T06:50:22Z","timestamp":1132642222000},"page":"53-65","source":"Crossref","is-referenced-by-count":0,"title":["How to build evidence in a public-key infrastructure for multi-domain environments"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Crispo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,15]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"R. Needham A. Birrell, B. Lampson and M. Schroeder. A Global Authentication Service Without Global Trust. In Proceedings of the IEEE Conference on Security and Privacy, 1986.","DOI":"10.1109\/SP.1986.10009"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"P. Hu B. Christianson and F. Snook. File server architecture for an open distributed document system. In Communication and Multimedia Security. Chapman and Hall, 1995.","DOI":"10.1007\/978-0-387-34943-5_4"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"M. Lomas B. Crispo. A Certification Scheme for Electronic Commerce. In Security Protocol Workshop, volume LNCS series vol. 1189. Springer-Verlag, 1997.","DOI":"10.1007\/3-540-62494-5_2"},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/138873.138874","volume":"10","author":"M. Burrows","year":"1992","unstructured":"M. Burrows B. Lampson, M. Abadi and E. Wobber. Theory and Practice. ACM Transaction on Computer Systems, 10:265\u2013310, November 1992.","journal-title":"ACM Transaction on Computer Systems"},{"key":"5_CR5","unstructured":"S. Boeyen, R. Housley, T. Howes, M. Myers, and P. Richard. Internet Draft: Internet Public Key Infrastructure Part 2: Operational Protocols. working draft \u2018in progress\u2019 available at:, ftp:\/\/ietf.org\/internet-drafts\/draft-ietf-pkix-ipki2opp00. txt, March 1997."},{"key":"5_CR6","unstructured":"W. E. Burr. Public Key Infrastructure-Technical Specifications (version 2.3) Part C \u2014 Concept of Operation. Work \u2018in progress\u2019 available at: http:\/\/csrc.nist.gov\/pki\/twg\/conops.ps, November 1996."},{"key":"5_CR7","unstructured":"S. Farrell C. Adams. Internet Draft: Internet Public Key Infrastructure Part III: Certificate Management Protocols. working draft \u2018in progress\u2019 available at:, ftp:\/\/ietf.org\/internet-drafts\/draft-ietf-pkix-ipki3cmp-02.txt, June 1997."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"D.W.Chadwick, A.J. Young, and N.K.Cicovic. Merging and Extending the PGP and PEM Trust Models \u2014 The ICE-TEL Trust Model. IEEE Network, June\/July, 1997.","DOI":"10.1109\/65.587045"},{"key":"5_CR9","unstructured":"C.M. Ellison. Internet Draft: SPKI Requirements. March 97, working draft \u2018in progress\u2019 available at:,ftp:\/\/ietf.org\/internet-drafts\/draft-ietf-spki-cert-req-00.txt, March 1997."},{"key":"5_CR10","unstructured":"C.M. Ellison, B. Frantz, B. Lampson, R. Rivest, B.M. Thomas, and T. Ylonen. Internet Draft: Simple Public Key Certificate Requirements. July 97, working draft \u2018in progress\u2019 available at:, ftp:\/\/ietf.org\/internet-drafts\/draft-ietf-spki-certstructure-02.txt, July 1997."},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"D. Gligor, S Luan, and J.N.Pato. On Inter-Realm Authentication in Large Distributed Systems. In Proceedings of the IEEE Conference on Security and Privacy, 1992.","DOI":"10.1109\/RISP.1992.213274"},{"key":"5_CR12","unstructured":"Information Technology-Open Systems Interconnection, Geneva. Draft Technical Corrigendum to Recommendation X.509, December 1995. The Directory: Authentication Framework."},{"key":"5_CR13","unstructured":"Information Technology-Open Systems Interconnection, Geneva. Recommendation X.509, June 1995. The Directory: Authentication Framework."},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"U. Maurer. Modeling a public-key infrastructure. In ESORICS 96, Roma, 1996. Springer-Verlag N.Y. LNCS 1146.","DOI":"10.1007\/3-540-61770-1_45"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"M.K.Reiter and S.G.Stubblebine. Toward Acceptable Metrics of Authentication. In Proceedings of the IEEE Conference on Security and Privacy, 1997.","DOI":"10.1109\/SECPRI.1997.601308"},{"key":"5_CR16","unstructured":"W. Polk R. Housley, W. Ford and D. Solo. Internet Draft: Internet Public Key Infrastructure Part I: X.509 Certificate and CRL Profile, working draft \u2018in progress\u2019 available at:, ftp:\/\/ietf.org\/internet-drafts\/draft-ietf-pkix-ipki-partl-04.txt, March 1996."},{"key":"5_CR17","unstructured":"T. Beth R. Yahalom, B. Klein. Trust Relationships in a Secure Systems-A Distributed Authentication Perspective. In Proceedings of the IEEE Conference on Security and Privacy, May 1993."},{"key":"5_CR18","unstructured":"T. Beth R. Yahalom, B. Klein. Trust-based navigation in distributed systems. Computing System 7(1), Winter, 1994"},{"key":"5_CR19","unstructured":"B. Lampson R.L. Rivest. SDSI-A Simple Distributed Security Infrastructure. http:\/\/theory.Ics.mit.edu\/ cis\/sdsi.html, April 1996."},{"key":"5_CR20","doi-asserted-by":"publisher","first-page":"993","DOI":"10.1145\/359657.359659","volume":"21","author":"M.D. Schroeder","year":"1978","unstructured":"M.D. Schroeder R.M. Needham. Using Encryption for Authentication in Large Network of Computers. Communications of ACM, 21:993\u2013999, 1978.","journal-title":"Communications of ACM"},{"key":"5_CR21","unstructured":"W. Ford S. Chokhani. Internet Draft: Internet Public Key Infrastructure Part IV: Certificate Policy and Certification Practices Framework, working draft \u2018in progress\u2019 available at:, ftp:\/\/ietf.org\/internet-drafts\/draft-ietf-pkix-ipki-part40l.txt, July 1997."},{"key":"5_CR22","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1002\/ett.4460050408","volume":"5","author":"G. J. Simmons","year":"1994","unstructured":"Gustav J. Simmons. Subliminal Channel:Past and Present. Europen Transactions on Telecommunications, 5:459\u2013473, July-August 1994.","journal-title":"Europen Transactions on Telecommunications"},{"key":"5_CR23","volume-title":"Protect I'Our Privacy","author":"W. Stallings","year":"1995","unstructured":"W. Stallings. Protect I'Our Privacy. Prentice-Hall, Englewood Cliffs, New Jersey, 1995."},{"key":"5_CR24","unstructured":"S. Stornetta and S. Haber. Secure Digital Names. In Proceedings of the 4th ACM Conference on Computer and Communication Security, 1997."},{"key":"5_CR25","unstructured":"B. Klein T. Beth, M. Borcherding. Valuation of trust in open network. In ESORICS 94, Brighton, Uk, November 1985. Springer-Verlag N.Y."},{"key":"5_CR26","unstructured":"VISA and MaserCard, http:\/\/www.mastercard.com\/set or http:\/\/www.visa.com\/set. SET: Secure Electronic Transactions, 1995."}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:50:11Z","timestamp":1586573411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028159"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540640400","9783540696889"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/bfb0028159","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]}}}