{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,2,10]],"date-time":"2023-02-10T03:14:20Z","timestamp":1675998860061},"reference-count":34,"publisher":"Elsevier BV","issue":"17","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Communications"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s0140-3664(00)00247-4","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T20:56:47Z","timestamp":1027630607000},"page":"1613-1620","source":"Crossref","is-referenced-by-count":5,"title":["Applying authorization to intranets: architectures, issues and APIs"],"prefix":"10.1016","volume":"23","author":[{"given":"P.","family":"Ashley","sequence":"first","affiliation":[]},{"given":"M.","family":"Vandenwauver","sequence":"additional","affiliation":[]},{"given":"F.","family":"Siebenlist","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0140-3664(00)00247-4_BIB1","doi-asserted-by":"crossref","unstructured":"C. Adams, The Simple Public Key GSS-API Mechanism (SPKM), October 1996. RFC2025.","DOI":"10.17487\/rfc2025"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB2","series-title":"Practical Intranet Security: An Overview of the State of the Art and Available Technologies","author":"Ashley","year":"1999"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB3","unstructured":"E. Baize, S. Farrell, T. Parker, The SESAME GSS-API Mechanism, November 1996. Internet Draft (expired)."},{"issue":"1","key":"10.1016\/S0140-3664(00)00247-4_BIB4","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/90.365435","article-title":"The KryptoKnight family of light weight protocols for authentication and key distribution","volume":"3","author":"Bird","year":"1995","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"9","key":"10.1016\/S0140-3664(00)00247-4_BIB5","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/2.58217","article-title":"Project Athena as a distributed computer system","volume":"23","author":"Champine","year":"1990","journal-title":"IEEE Computer"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB6","series-title":"Firewalls and Internet Security: Repelling the Wily Hacker","author":"Cheswick","year":"1994"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB7","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen, The TLS Protocol Version 1.0, January 1999. RFC2246.","DOI":"10.17487\/rfc2246"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB8","unstructured":"ECMA 219. ECMA-219 Security in Open Systems-Authentication and Privilege Attribute Security Application with Related Key Distribution Functionality, 2nd ed., March 1996. European Computer Manufacturers Association."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB9","series-title":"Practical Unix and Internet Security","author":"Garfinkel","year":"1996"},{"issue":"5","key":"10.1016\/S0140-3664(00)00247-4_BIB10","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/6.135407","article-title":"Unclogging distributed computing","volume":"29","author":"Hartman","year":"1992","journal-title":"IEEE Spectrum"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB11","unstructured":"IETF-CAT. IETF Common Authentication Technology (CAT) Working Group, http:\/\/www.ietf.org\/html.charters\/cat-charter.html."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB12","unstructured":"ISO 10181-3. Information Technology \u2014 Open Systems Interconnect \u2014 Security Frameworks in Open Systems: Access Control Framework. International Organization for Standardization, Geneva, Switzerland, 1996."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB13","unstructured":"ITU. ITU-T Rec. X.509 (revised). The Directory \u2014 Authentication Framework, 1993. International Telecommunication Union, Geneva, Switzerland."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB14","doi-asserted-by":"crossref","unstructured":"P. Kaijser, A review of the SESAME Development, in: C. Boyd, E. Dawson (Eds.), Proceedings of the Third ACISP Conference \u2014 LNCS 1438 Springer, Berlin, 1998, pp. 1\u20138.","DOI":"10.1007\/BFb0053716"},{"issue":"7","key":"10.1016\/S0140-3664(00)00247-4_BIB15","doi-asserted-by":"crossref","first-page":"501","DOI":"10.1016\/0140-3664(94)90105-8","article-title":"SESAME: the solution to security for open distributed systems","volume":"17","author":"Kaijser","year":"1994","journal-title":"Computer Communications"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB16","doi-asserted-by":"crossref","unstructured":"J. Kohl, C. Neuman, The Kerberos Network Authentication Service V5, September 1993. RFC1510.","DOI":"10.17487\/rfc1510"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB17","doi-asserted-by":"crossref","unstructured":"M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, L. Jones, SOCKS Protocol Version 5, March 1996. RFC1928.","DOI":"10.17487\/rfc1928"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB18","doi-asserted-by":"crossref","unstructured":"J. Linn, Generic Security Services Application Program Interface, September 1993. RFC1508.","DOI":"10.17487\/rfc1508"},{"issue":"7","key":"10.1016\/S0140-3664(00)00247-4_BIB19","doi-asserted-by":"crossref","first-page":"000","DOI":"10.1016\/0140-3664(94)90103-1","article-title":"Generic interface to security services","volume":"17","author":"Linn","year":"1994","journal-title":"Computer Communications"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB20","doi-asserted-by":"crossref","unstructured":"J. Linn, The Kerberos Version 5 GSS-API Mechanism, June 1996. RFC1964.","DOI":"10.17487\/rfc1964"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB21","doi-asserted-by":"crossref","unstructured":"J. Linn, Generic Security Service Application Program Interface Version 2, January 1997. RFC2078.","DOI":"10.17487\/rfc2078"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB22","doi-asserted-by":"crossref","unstructured":"P. McMahon, SESAME V2 Public Key and Authorisation Extensions To Kerberos. Proceedings of the Symposium on Network and Distributed System Security, February 1995, pp. 114 \u2013131.","DOI":"10.1109\/NDSS.1995.390640"},{"issue":"9","key":"10.1016\/S0140-3664(00)00247-4_BIB23","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/35.312841","article-title":"Kerberos: an authentication service for computer networks","volume":"32","author":"Neuman","year":"1994","journal-title":"IEEE Communication Magazine"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB24","unstructured":"OMG. The CORBA Home Page. Available at http:\/\/www.omg.org\/corba."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB25","unstructured":"T. Parker, D. Pinkas, Extended Generic Security Services APIs: XGSS-APIs Access Control and Delegation Extensions, November 1998. Internet Draft (expired)."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB26","series-title":"Understanding DCE","author":"Rosenberry","year":"1992"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB27","unstructured":"T. Ryutov, C. Neuman, Access Control Framework for Distributed Applications, June 1999. Internet Draft, expires January 2000."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB28","unstructured":"T. Ryutov, C. Neuman, Generic Authorization and Access Control Application Program Interface C-binding, June 1999. Internet Draft, expires January 2000."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB29","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"02","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB30","unstructured":"F. Siebenlist, D. Hemsath, DCE 1.2.3 Public Key Certificate Login \u2014 Functional Specification, July 1998. DCE-RFC 68.4, The Open Group."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB31","doi-asserted-by":"crossref","unstructured":"M. Strebe, C. Perkins, M.C. Moncur, NT4 Network Security. Network Press, 1999.","DOI":"10.1016\/S1353-4858(00)87242-6"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB32","doi-asserted-by":"crossref","unstructured":"J. Tardo, K. Alagappan, S.P.X.: Global, Authentication Using Public Key Certificates. Proceedings of the 1991 IEEE Symposium on Security and Privacy, May 1991, pp. 232\u2013244.","DOI":"10.1109\/RISP.1991.130791"},{"key":"10.1016\/S0140-3664(00)00247-4_BIB33","unstructured":"B. Tung, C. Neuman, M. Hur, A. Medvinsky, S. Medvinsky, J. Wray, J. Trostle, Public Key Cryptography for Initial Authentication in Kerberos, October 1999. Internet Draft, expires April 2000."},{"key":"10.1016\/S0140-3664(00)00247-4_BIB34","doi-asserted-by":"crossref","unstructured":"M. Vandenwauver, R. Govaerts, J. Vandewalle. How Role Based Access Control is Implemented in SESAME. Proceedings of the Sixth Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, pages 293\u2013298. IEEE Computer Society, 1997.","DOI":"10.1109\/ENABL.1997.630828"}],"container-title":["Computer Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002474?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0140366400002474?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,17]],"date-time":"2020-01-17T06:23:33Z","timestamp":1579242213000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0140366400002474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":34,"journal-issue":{"issue":"17","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S0140366400002474"],"URL":"https:\/\/doi.org\/10.1016\/s0140-3664(00)00247-4","relation":{},"ISSN":["0140-3664"],"issn-type":[{"value":"0140-3664","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}