{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T16:47:25Z","timestamp":1725468445218},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540645986"},{"type":"electronic","value":"9783540693437"}],"license":[{"start":{"date-parts":[[1998,1,1]],"date-time":"1998-01-01T00:00:00Z","timestamp":883612800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1998]]},"DOI":"10.1007\/bfb0056996","type":"book-chapter","created":{"date-parts":[[2006,8,17]],"date-time":"2006-08-17T17:16:29Z","timestamp":1155834989000},"page":"521-534","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Public Key Infrastructure and certification policy for inter-domain management"],"prefix":"10.1007","author":[{"given":"Jon","family":"\u00d8lnes","sequence":"first","affiliation":[]},{"given":"Matthieu","family":"Verdier","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Ganivet","sequence":"additional","affiliation":[]},{"given":"Dominique","family":"Maillot","sequence":"additional","affiliation":[]},{"given":"Jonn","family":"Skretting","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,6,3]]},"reference":[{"key":"50_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R., Roe, M.: The GCHQ Protocol and Its Problems, Proceedings of the EUROCRYPT'97 Conference (1997)","DOI":"10.1007\/3-540-69053-0_11"},{"key":"50_CR2","unstructured":"CEC: Towards a European Framework for Digital Signatures and Encryption, Communication from the Commission to the European Parliament et. al., adopted by the Commission on 8. October 1997 (1997)"},{"key":"50_CR3","unstructured":"ACTS Project 112 TRUMPET Deliverable 2, Inter-TMN Security Policies (1996)"},{"key":"50_CR4","unstructured":"ACTS Project 112 TRUMPET Deliverable 7, Security Policies and System Architecture Specification (1997)"},{"key":"50_CR5","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"IT-11","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New Directions in Cryptography, IEEE Transactions on Information Theory, IT-11 (1976) 644\u2013654","journal-title":"IEEE Transactions on Information Theory"},{"key":"50_CR6","unstructured":"ETSI: Requirements Specification for an Encryption Algorithm for Operators of European Public Telecommunications Networks, ETSI TC-TR NA\/STAG 5 (93) 123 rev. 4 (1993)"},{"key":"50_CR7","unstructured":"http:\/\/www.darmstadt.gmd.de\/ice-tel"},{"key":"50_CR8","unstructured":"ITU-T M.3010: Principles of a Telecommunications Management Network (1995)"},{"key":"50_CR9","unstructured":"ITU-T X.509 ISO\/IEC 9594-8: OSI \u2014 The Directory \u2014 Part 8: Authentication Framework, Revision 1 (1995)"},{"key":"50_CR10","unstructured":"ITU-T X.509 Amendment 1 ISO\/IEC 9594-8 Amd 1: OSI \u2014 The Directory \u2014 Part 8: Authentication Framework \u2014 Amendment 1: Certificate Extensions (1995)"},{"key":"50_CR11","unstructured":"ITU-T X.810 ISO\/IEC 10181-1: OSI \u2014 Security Frameworks for Open Systems, Part 1: Overview (1996)"},{"key":"50_CR12","unstructured":"OECD: Recommendations of the Council Concerning Guidelines for Cryptography Policy, document C\/M(97)6\/PROV (1997)"},{"key":"50_CR13","unstructured":"RFC 1421-1424: Privacy Enhancement for Internet Electronic Mail (1994)"},{"key":"50_CR14","unstructured":"RFC 1777: Lightweight Directory Access Protocol (1995)"},{"key":"50_CR15","unstructured":"RFC 2078: Generic Security Service Application Program Interface, Version 2 (1997)"},{"key":"50_CR16","doi-asserted-by":"crossref","unstructured":"Jefferies, N., Mitchell, C., Walker, M.: A proposed Architecture for Trusted Third Party Services, Proceedings of the PKCS '96 Conference (1996)","DOI":"10.1007\/BFb0032349"},{"key":"50_CR17","unstructured":"http:\/\/www.darmstadt.gmd.de\/secude"}],"container-title":["Lecture Notes in Computer Science","Intelligence in Services and Networks: Technology for Ubiquitous Telecom Services"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BFb0056996","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T13:21:33Z","timestamp":1558272093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BFb0056996"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998]]},"ISBN":["9783540645986","9783540693437"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/bfb0056996","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1998]]},"assertion":[{"value":"3 June 2006","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}