{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T13:21:52Z","timestamp":1725456112316},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540636960"},{"type":"electronic","value":"9783540696285"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/bfb0028467","type":"book-chapter","created":{"date-parts":[[2005,11,22]],"date-time":"2005-11-22T08:09:54Z","timestamp":1132646994000},"page":"109-117","source":"Crossref","is-referenced-by-count":3,"title":["Secure document management and distribution in an open network environment"],"prefix":"10.1007","author":[{"given":"Antonio","family":"Lioy","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Maino","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Mezzalama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,6,17]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"K. Sikkel, \u201cA Group-based Authorization Model for Cooperative Systems\u201d, Proceedings European Conference on Computer-Supported Cooperative Work (ECSCW'97), Lancaster (UK), September 1997.","DOI":"10.1007\/978-94-015-7372-6_23"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"R. Bentley, W. Appelt, U. Busbach, E. Hinrichs, D. Kerr, S. Sikkel, J. Trevor, G. Woetzel, \u201cBasic Support for Cooperative Work on the World Wide Web\u201d, International Journal of Human-Computer Studies: Special issue on Innovative Applications of the World Wide Web, Spring 1997","DOI":"10.1006\/ijhc.1996.0108"},{"key":"11_CR3","unstructured":"\u201cICE-TEL: Interworking Public-Key Certification Infrastructure for Europe\u201d, project RE 1005 of the Telematics programme of the European Commission http:\/\/www.darmstadt.gmd.de\/ice-tel\/"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"J. Linn, \u201cPrivacy Enhancement for Internet Electronic Mail, Part I: Message Encryption and Authentication Procedure\u201d, RFC-1421, February 1993","DOI":"10.17487\/rfc1421"},{"key":"11_CR5","unstructured":"\u201cDigital Signature Initiative\u201d, World Wide Web Consortium http:\/\/www.w3.org\/Security\/DSig\/Overview.html"},{"key":"11_CR6","unstructured":"A.O. Freier, P.L. Karlton, P.C. Kocher, \u201cThe SSL Protocol (version 3.0)\u201d, Netscape Communications Corporation http:\/\/home.netscape.com\/eng\/ss13"},{"key":"11_CR7","unstructured":"E.A. Young, T Hudson, \u201cSSLeay and SSLapps FAQ\u201d, http:\/\/psych.psy.uq.oz.au\/\u223cftp\/Crypto\/"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0028467","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T02:58:08Z","timestamp":1586573888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0028467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540636960","9783540696285"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/bfb0028467","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}