{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,14]],"date-time":"2024-08-14T23:32:24Z","timestamp":1723678344953},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Italian Ministry of Education, University and Research","award":["20103P34XC_008"],"award-info":[{"award-number":["20103P34XC_008"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1007\/s10207-017-0390-0","type":"journal-article","created":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T02:20:00Z","timestamp":1503454800000},"page":"603-612","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Access right management by extended password capabilities"],"prefix":"10.1007","volume":"17","author":[{"given":"Lanfranco","family":"Lopriore","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"issue":"1","key":"390_CR1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1093\/comjnl\/29.1.1","volume":"29","author":"M Anderson","year":"1986","unstructured":"Anderson, M., Pose, R.D., Wallace, C.S.: A password-capability system. Comput. J. 29(1), 1\u20138 (1986)","journal-title":"Comput. J."},{"issue":"5","key":"390_CR2","doi-asserted-by":"crossref","first-page":"595","DOI":"10.1093\/comjnl\/bxm124","volume":"51","author":"MD Castro","year":"2008","unstructured":"Castro, M.D., Pose, R.D., Kopp, C.: Password-capabilities and the Walnut kernel. Comput. J. 51(5), 595\u2013607 (2008)","journal-title":"Comput. J."},{"issue":"10","key":"390_CR3","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1145\/141937.141969","volume":"27","author":"JS Chase","year":"1992","unstructured":"Chase, J.S., Levy, H.M., Lazowska, E.D., Baker-Harvey, M.: Lightweight shared objects in a 64-bit operating system. ACM SIGPLAN Notices 27(10), 397\u2013413 (1992)","journal-title":"ACM SIGPLAN Notices"},{"issue":"7","key":"390_CR4","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/208639.208641","volume":"30","author":"M Vivo de","year":"1995","unstructured":"de Vivo, M., de Vivo, G.O., Gonzalez, L.: A brief essay on capabilities. ACM SIGPLAN Notices 30(7), 29\u201336 (1995)","journal-title":"ACM SIGPLAN Notices"},{"key":"390_CR5","unstructured":"England, D.M.: Capability concept mechanism and structure in System 250. In: Proceedings of the International Workshop on Protection in Operating Systems, pp. 63\u201382. IRIA, Paris, France (1974)"},{"issue":"6","key":"390_CR6","doi-asserted-by":"crossref","first-page":"575","DOI":"10.1109\/TSE.1979.230193","volume":"SE\u20135","author":"VD Gligor","year":"1979","unstructured":"Gligor, V.D.: Review and revocation of access privileges distributed through capabilities. IEEE Trans. Softw. Eng. SE\u20135(6), 575\u2013586 (1979)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"390_CR7","doi-asserted-by":"crossref","unstructured":"Grove, D.A., Murray, T.C., Owen, C.A., North, C.J., Jones, J.A., Beaumont, M.R., Hopkin, B.D.: An overview of the Annex system. In: Proceedings of the Twenty-Third Annual Computer Security Applications Conference, pp. 341\u2013352. IEEE, Miami Beach, Florida, USA (2007)","DOI":"10.1109\/ACSAC.2007.8"},{"issue":"9","key":"390_CR8","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1002\/(SICI)1097-024X(19980725)28:9<901::AID-SPE181>3.0.CO;2-7","volume":"28","author":"G Heiser","year":"1998","unstructured":"Heiser, G., Elphinstone, K., Vochteloo, J., Russell, S., Liedtke, J.: The Mungi single-address-space operating system. Softw. Pract. Exp. 28(9), 901\u2013928 (1998)","journal-title":"Softw. Pract. Exp."},{"key":"390_CR9","unstructured":"Houdek, M.E., Soltis, F.G., Hoffman, R.L.: IBM System\/38 support for capability-based addressing. In: Proceedings of the 8th Annual Symposium on Computer Architecture, pp. 341\u2013348. IEEE Computer Society Press, Minneapolis, Minnesota, USA (1981)"},{"key":"390_CR10","doi-asserted-by":"crossref","unstructured":"King-Lacroix, J., Martin, A.: BottleCap: a credential manager for capability systems. In: Proceedings of the Seventh ACM Workshop on Scalable Trusted Computing, pp. 45\u201354. ACM, Raleigh, NC, USA (2012)","DOI":"10.1145\/2382536.2382545"},{"key":"390_CR11","doi-asserted-by":"crossref","unstructured":"Klein, G., Elphinstone, K., Heiser, G., Andronick, J., Cock, D., Derrin, P., Elkaduwe, D., Engelhardt, K., Kolanski, R., Norrish, M., et\u00a0al.: seL4: formal verification of an OS kernel. In: Proceedings of the 22nd ACM Symposium on Operating Systems Principles, pp. 207\u2013220. ACM, Big Sky, MT, USA (2009)","DOI":"10.1145\/1629575.1629596"},{"issue":"11","key":"390_CR12","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","volume":"24","author":"L Lamport","year":"1981","unstructured":"Lamport, L.: Password authentication with insecure communication. Commun. ACM 24(11), 770\u2013772 (1981)","journal-title":"Commun. ACM"},{"key":"390_CR13","doi-asserted-by":"crossref","unstructured":"Leung, A.W., Miller, E.L.: Scalable security for large, high performance storage systems. In: Proceedings of the Second ACM Workshop on Storage Security and Survivability, pp. 29\u201340. ACM, Alexandria, Virginia, USA (2006)","DOI":"10.1145\/1179559.1179565"},{"key":"390_CR14","volume-title":"Capability-Based Computer Systems","author":"HM Levy","year":"1984","unstructured":"Levy, H.M.: Capability-Based Computer Systems. Digital Press, Bedford, Mass, USA (1984)"},{"issue":"4","key":"390_CR15","doi-asserted-by":"crossref","first-page":"497","DOI":"10.1093\/comjnl\/bxr107","volume":"55","author":"L Lopriore","year":"2012","unstructured":"Lopriore, L.: Encrypted pointers in protection system design. Comput. J. 55(4), 497\u2013507 (2012)","journal-title":"Comput. J."},{"issue":"4","key":"390_CR16","doi-asserted-by":"crossref","first-page":"782","DOI":"10.1093\/comjnl\/bxt131","volume":"58","author":"L Lopriore","year":"2015","unstructured":"Lopriore, L.: Password capabilities revisited. Comput. J. 58(4), 782\u2013791 (2015)","journal-title":"Comput. J."},{"key":"390_CR17","doi-asserted-by":"crossref","unstructured":"Merkle, R.C.: One way hash functions and DES. In: Proceedings of the 9th Annual International Cryptology Conference\u2014Advances in Cryptology, pp. 428\u2013446. Springer, Santa Barbara, California, USA (1989)","DOI":"10.1007\/0-387-34805-0_40"},{"key":"390_CR18","unstructured":"Miller, M.S., Yee, K.-P., Shapiro, J.: Capability myths demolished. Technical Report, Systems Research Laboratory, Johns Hopkins University. http:\/\/srl.cs.jhu.edu\/pubs\/SRL2003-02.pdf (2003)"},{"key":"390_CR19","doi-asserted-by":"crossref","unstructured":"Neumann, P.G., Feiertag, R.J.: PSOS revisited. In: Proceedings of the 19th Annual Computer Security Applications Conference, pp. 208\u2013216. IEEE, Las Vegas, NV, USA (2003)","DOI":"10.1109\/CSAC.2003.1254326"},{"key":"390_CR20","doi-asserted-by":"crossref","unstructured":"Pose, R.: Password-capabilities: their evolution from the Password-Capability System into Walnut and beyond. In: Proceedings of the Sixth Australasian Computer Systems Architecture Conference, pp. 105\u2013113. IEEE, Gold Coast, Australia (2001)","DOI":"10.1109\/ACAC.2001.903370"},{"key":"390_CR21","doi-asserted-by":"crossref","unstructured":"Preneel, B., Govaerts, R., Vandewalle, J.: Hash functions based on block ciphers: a synthetic approach. In: Proceedings of the 13th Annual International Cryptology Conference, pp. 368\u2013378. Springer, Santa Barbara, California, USA (1993)","DOI":"10.1007\/3-540-48329-2_31"},{"key":"390_CR22","doi-asserted-by":"crossref","unstructured":"Samarati, P., De Capitani Di Vimercati, S.: Access control: policies, models, and mechanisms. In: Focardi, R., Gorrieri, R. (eds.) Foundations of Security Analysis and Design, pp. 137\u2013196. Springer, Berlin, Heidelberg (2001)","DOI":"10.1007\/3-540-45608-2_3"},{"issue":"2","key":"390_CR23","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/0020-0190(88)90099-3","volume":"27","author":"RS Sandhu","year":"1988","unstructured":"Sandhu, R.S.: Cryptographic implementation of a tree hierarchy for access control. Inf. Process. Lett. 27(2), 95\u201398 (1988)","journal-title":"Inf. Process. Lett."},{"key":"390_CR24","doi-asserted-by":"crossref","unstructured":"Seitz, L., Pierson, J.-M., Brunie, L.: Key management for encrypted data storage in distributed systems. In: Proceedings of the Second IEEE International Security in Storage Workshop, pp. 20\u201330. IEEE, Washington, DC, USA (2003)","DOI":"10.1109\/SISW.2003.10001"},{"issue":"2","key":"390_CR25","first-page":"170","volume":"34","author":"JS Shapiro","year":"2000","unstructured":"Shapiro, J.S., Smith, J.M., Farber, D.J.: EROS: a fast capability system. ACM SIGOPS Oper. Syst. Rev. 34(2), 170\u2013185 (2000)","journal-title":"ACM SIGOPS Oper. Syst. Rev."},{"issue":"4","key":"390_CR26","doi-asserted-by":"crossref","first-page":"544","DOI":"10.1109\/TMM.2003.813279","volume":"5","author":"W Trappe","year":"2003","unstructured":"Trappe, W., Song, J., Poovendran, R., Liu, K.J.: Key management and distribution for secure multimedia multicast. IEEE Trans. Multimed. 5(4), 544\u2013557 (2003)","journal-title":"IEEE Trans. Multimed."},{"key":"390_CR27","volume-title":"The Cambridge CAP Computer and Its Operating System","author":"MV Wilkes","year":"1979","unstructured":"Wilkes, M.V., Needham, R.M.: The Cambridge CAP Computer and Its Operating System. North-Holland, New York (1979)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-017-0390-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0390-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-017-0390-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,2]],"date-time":"2019-10-02T13:59:18Z","timestamp":1570024758000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-017-0390-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":27,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,10]]}},"alternative-id":["390"],"URL":"https:\/\/doi.org\/10.1007\/s10207-017-0390-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,23]]}}}