{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,12,29]],"date-time":"2022-12-29T10:15:35Z","timestamp":1672308935545},"reference-count":40,"publisher":"Elsevier BV","issue":"5","license":[{"start":{"date-parts":[[1991,10,1]],"date-time":"1991-10-01T00:00:00Z","timestamp":686275200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Networks and ISDN Systems"],"published-print":{"date-parts":[[1991,10]]},"DOI":"10.1016\/0169-7552(91)90094-s","type":"journal-article","created":{"date-parts":[[2003,8,7]],"date-time":"2003-08-07T23:17:02Z","timestamp":1060298222000},"page":"363-382","source":"Crossref","is-referenced-by-count":8,"title":["Secure control of transit internetwork traffic"],"prefix":"10.1016","volume":"22","author":[{"given":"Deborah","family":"Estrin","sequence":"first","affiliation":[]},{"given":"Gene","family":"Tsudik","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0169-7552(91)90094-S_BIB1","article-title":"Intermediate system to intermediate system interdomain routeing information exchange protocol","author":"ANSI","year":"1990","journal-title":"Document Number X3S3.3\/90-132"},{"key":"10.1016\/0169-7552(91)90094-S_BIB2","series-title":"Proc. 1990 IEEE Symposium on Security and Privacy","article-title":"SP3 peer identification","author":"Birnbaum","year":"1990"},{"key":"10.1016\/0169-7552(91)90094-S_BIB3","series-title":"Blacker front end interface control document","volume":"Vol. 1","year":"1985"},{"key":"10.1016\/0169-7552(91)90094-S_BIB4","article-title":"Models of policy routing","author":"Braun","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB5","series-title":"Proc. 1990 ACM Sigcomm Conference","article-title":"Design of inter-administrative domain routing protocols","author":"Breslau","year":"1990"},{"key":"10.1016\/0169-7552(91)90094-S_BIB6","article-title":"The Directory Authentication Framework","author":"CCITT","year":"1988","journal-title":"CCITT Recommendation X.509"},{"key":"10.1016\/0169-7552(91)90094-S_BIB7","series-title":"Proc. 1989 ACM SIGCOMM Symposium","article-title":"SIRPENT: a high-performance internetworking approach","author":"Cheriton","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB8","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1102","article-title":"Policy routing in internet protocols","author":"Clark","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB9","series-title":"Proc. 1989 IEEE Symposium on Security and Privacy","article-title":"Security issues in policy routing","author":"Estrin","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB10","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1109\/49.17712","article-title":"Visa protocols for controlling inter-organizational datagram flow","volume":"7","author":"Estrin","year":"1989","journal-title":"IEEE J. Selected Areas Comm."},{"key":"10.1016\/0169-7552(91)90094-S_BIB11","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1125","article-title":"Policy requirements for inter administrative domain routing","author":"Estrin","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB12","article-title":"End-to-end Argument for Network-Layer Access Controls","author":"Estrin","year":"1990","journal-title":"University of Southern California Technical Report TR-90-13"},{"key":"10.1016\/0169-7552(91)90094-S_BIB13","article-title":"Inter-domain intermediate systems routing","author":"European Computer Manufacturers Association","year":"1989","journal-title":"Technical Report ECMA\/TC32-TG10\/89\/56"},{"key":"10.1016\/0169-7552(91)90094-S_BIB14","series-title":"Proc. 1989 National Computer Security Conference","article-title":"The Digital Distributed System Security Architecture","author":"Gasser","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB15","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1136","article-title":"Administrative domains and routing domains: a model for routing in the internet","author":"Hares","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB16","series-title":"Proc. 1988 ACM SIGCOMM Symposium","article-title":"The VMP network adapter board NAB: high-performance network communication for multiprocessors","author":"Kanakai","year":"1988"},{"issue":"1","key":"10.1016\/0169-7552(91)90094-S_BIB17","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1016\/0169-7552(85)90036-4","article-title":"Authentication and discretionary control in computer networks","volume":"10","author":"Karger","year":"1985","journal-title":"Comput. Networks ISDN Systems"},{"key":"10.1016\/0169-7552(91)90094-S_BIB18","first-page":"369","article-title":"Protocols and Techniques for Data Communication Networks","author":"Kent","year":"1980"},{"key":"10.1016\/0169-7552(91)90094-S_BIB19","article-title":"An architecture for inter-domain policy routing","author":"Lepp","year":"1990"},{"key":"10.1016\/0169-7552(91)90094-S_BIB20","doi-asserted-by":"crossref","DOI":"10.17487\/rfc1113","article-title":"Privacy enhancement for internet electronic mail. Part I: message encipherment and authentication procedures","author":"Linn","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB21","article-title":"Privacy enhancement for internet electronic mail. Part II: algorithms, modes and identifiers","author":"Linn","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB22","series-title":"Proc. 1990 IEEE Symposium on Security and Privacy","article-title":"Practical authentication for distributed computing","author":"Linn","year":"1990"},{"key":"10.1016\/0169-7552(91)90094-S_BIB23","article-title":"Border gateway protocol","author":"Lougheed","year":"1989"},{"key":"10.1016\/0169-7552(91)90094-S_BIB24","article-title":"Adaptive routing algorithms for distributed computer networks","author":"McQuillan","year":"1984","journal-title":"BBN Report 2831"},{"key":"10.1016\/0169-7552(91)90094-S_BIB25","first-page":"1802","article-title":"The new routing algorithm for the ARPANET","author":"McQuillan","year":"1980","journal-title":"IEEE Trans. Comm."},{"key":"10.1016\/0169-7552(91)90094-S_BIB26","series-title":"Proc. Summer 1989 USENIX Technical Conference","article-title":"Simple and flexible datagram access controls for Unix-based gateways","author":"Mogul","year":"1987"},{"key":"10.1016\/0169-7552(91)90094-S_BIB27","doi-asserted-by":"crossref","unstructured":"J. Mogul, Private communication, June 1990.","DOI":"10.1145\/99517.99562"},{"key":"10.1016\/0169-7552(91)90094-S_BIB28","doi-asserted-by":"crossref","first-page":"993","DOI":"10.1145\/359657.359659","article-title":"Using encryption for authentication in large networks of computers","volume":"21","author":"Needham","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0169-7552(91)90094-S_BIB29","doi-asserted-by":"crossref","first-page":"233","DOI":"10.1109\/TSE.1987.233148","article-title":"Factors affecting distributed system security","volume":"13","author":"Nessett","year":"1987","journal-title":"IEEE Trans. Software Eng."},{"key":"10.1016\/0169-7552(91)90094-S_BIB30","author":"International Standards Organization","year":"1989","journal-title":"OSI Routeing Framework, ISO\/TF 9575"},{"key":"10.1016\/0169-7552(91)90094-S_BIB31","article-title":"Network layer protocols with byzantine robustness, MIT LCS TR-429","author":"Perlman","year":"1988","journal-title":"Ph.D. Dissertation"},{"key":"10.1016\/0169-7552(91)90094-S_BIB32","doi-asserted-by":"crossref","DOI":"10.17487\/rfc0791","article-title":"Internet protocol","author":"Postel","year":"1981"},{"key":"10.1016\/0169-7552(91)90094-S_BIB33","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/359340.359342","article-title":"A method for obtaining digital signatures and public key cryptosystems","volume":"21","author":"Rivest","year":"1978","journal-title":"Comm. ACM"},{"key":"10.1016\/0169-7552(91)90094-S_BIB34","series-title":"Proc. CRYPTO'90","article-title":"The MD4 message digest algorithm","author":"Rivest","year":"1990"},{"key":"10.1016\/0169-7552(91)90094-S_BIB35","doi-asserted-by":"crossref","DOI":"10.17487\/rfc0827","article-title":"Exterior Gateway Protocol (EGP)","author":"Rosen","year":"1982"},{"key":"10.1016\/0169-7552(91)90094-S_BIB36","first-page":"195","article-title":"End-to-end arguments in system design","volume":"3","author":"Saltzer","year":"1984","journal-title":"ACM Trans. Comput. Systems"},{"key":"10.1016\/0169-7552(91)90094-S_BIB37","unstructured":"SDNS Protocol and Signaling Working Group, SP3 Subgroup, SDNS Secure Data Network System Security Protocol 3 (SP3), SDN.301 Revision 1.5 1989-05-15."},{"key":"10.1016\/0169-7552(91)90094-S_BIB38","article-title":"Inter-domain policy routing protocol specification and usage: version 1","author":"Steenstrup","year":"1990"},{"key":"10.1016\/0169-7552(91)90094-S_BIB39","article-title":"The Kerberos network authentication service overview","author":"Steiner","year":"1989","journal-title":"MIT Project Athena RFC, Draft 1"},{"key":"10.1016\/0169-7552(91)90094-S_BIB40","doi-asserted-by":"crossref","first-page":"135","DOI":"10.1145\/356909.356913","article-title":"Security mechanisms in high-level network Protocols","volume":"15","author":"Voydock","year":"1983","journal-title":"ACM Comput. Surveys"}],"container-title":["Computer Networks and ISDN Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016975529190094S?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016975529190094S?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T07:24:43Z","timestamp":1552634683000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016975529190094S"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,10]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[1991,10]]}},"alternative-id":["016975529190094S"],"URL":"https:\/\/doi.org\/10.1016\/0169-7552(91)90094-s","relation":{},"ISSN":["0169-7552"],"issn-type":[{"value":"0169-7552","type":"print"}],"subject":[],"published":{"date-parts":[[1991,10]]}}}