{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T19:24:56Z","timestamp":1766085896393},"reference-count":29,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2000,12,1]],"date-time":"2000-12-01T00:00:00Z","timestamp":975628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[2000,12]]},"DOI":"10.1016\/s0167-4048(00)08022-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T17:17:04Z","timestamp":1027617424000},"page":"731-746","source":"Crossref","is-referenced-by-count":5,"title":["Securing The Electronic Market: The KEYSTONE Public Key Infrastructure Architecture"],"prefix":"10.1016","volume":"19","author":[{"given":"Stefanos","family":"Gritzalis","sequence":"first","affiliation":[]},{"given":"Sokratis K","family":"Katsikas","sequence":"additional","affiliation":[]},{"given":"Dimitrios","family":"Lekkas","sequence":"additional","affiliation":[]},{"given":"Konstantinos","family":"Moulinos","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Polydorou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0167-4048(00)08022-6_BIB1","unstructured":"W. T. Polk, D. F. Dodson, et al, Public Key Infrastructure: From Theory to Implementation, http:\/\/csrc.nist.gov\/pki\/panel\/overview.html."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB2","unstructured":"Public Key Infrastructure, http:\/\/www.ietf.org\/html.charters\/pkix-charter.html."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB3","unstructured":"B. Kaliski, An overview of the PKCS standards, RSA Laboratories, 1993."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB4","unstructured":"P. R. Zimmermann, The Official PGP User\u2019s Guide, MIT Press, 1995."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB5","unstructured":"C. Ellison et al., SPKI Examples, 1998 (draft-ietf-spki-cert-examples-01.txt)."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB6","doi-asserted-by":"crossref","unstructured":"C. Ellison et al., SPKI requirements, 1998 (draft-ietf-spki-cert-req-02.txt).","DOI":"10.17487\/rfc2692"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB7","unstructured":"C. Ellison et al., Simple Public Key Certificate, 1998 (draft-ietf-spki-cert-structure-05.txt)."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB8","doi-asserted-by":"crossref","unstructured":"C. Ellison et al., SPKI Certificate Theory, 1998 (draft-ietf-spki-cert-theory-03.txt).","DOI":"10.17487\/rfc2693"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB9","unstructured":"R. L. Rivest, B. Lampson, SDSI \u2013 A Simple Distributed Security Infrastructure, http:\/\/theory.lcs.mit.edu\/cis\/sdsi.html."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB10","doi-asserted-by":"crossref","unstructured":"M. Blaze, J. Feigenbaum, J. Lacy, \u201cDecentralized Trust Management\u201d, in Proceedings, IEEE Conference on Security and Privacy, IEEE Computer Society Press, 1996.","DOI":"10.1109\/SECPRI.1996.502679"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB11","doi-asserted-by":"crossref","unstructured":"Q. He, K. Sycara and Z. Su, \u201cA solution to open standard of PKI\u201d, in C. Boyd and E. Dawson (Eds.), Information Security and Privacy, Lecture Notes in Computer Science, Springer-Verlag, 1998.","DOI":"10.1007\/BFb0053725"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB12","doi-asserted-by":"crossref","unstructured":"W. Burr D. Dodson, N. Nazario, T. Polk, MISPKI: Minimum Interoperability Specification for PKI Components, June 1997, NIST.","DOI":"10.6028\/NIST.SP.800-15"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB13","unstructured":"Specifications for Trusted Third Party Services, September 1997, ETSI DEN\/SEC-003001."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB14","doi-asserted-by":"crossref","unstructured":"T. Gustavsson, \u201cA WWW based Certification Infrastructure for secure open network transactions\u201d, in P. Horster (Ed.) Communications and Multimedia Security Volume 2, Chapman & Hall, 1996.","DOI":"10.1007\/978-0-387-35083-7_14"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB15","unstructured":"SET Secure Electronic Transactions Specification version 1.0, Books 1-3, SET consortium, 1997."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB16","doi-asserted-by":"crossref","unstructured":"A. van Rensburg and S. von Solms, \u201cA reference framework for Certification Authorities \/ Trusted Third Parties\u201d, in L. Yngstrom and J. Carlsen (Eds.), Proceedings, IFIP 13th International Information Security Conference, Chapman & Hall, 1996.","DOI":"10.1007\/978-0-387-35259-6_18"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB17","unstructured":"Trusted Health Information Systems (THIS) project, Final report: Requirements on electronic signature services and TTP services, Swedish Institute for Health Services Development, 1995."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB18","unstructured":"TrustHealth-ETS project, Functional specification of TTP services, Swedish Institute for Health Services Development, 1995."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB19","unstructured":"TTP & Electronic Signature Trial for Inter-Modal Transport (TESTFIT) project, Final report, CEC\/DGXIII\/B6, 1995"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB20","unstructured":"BOLERO project, Final Report, CEC\/DGXIII\/B6, 1995."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB21","doi-asserted-by":"crossref","unstructured":"Ebridge project, Final Report, CEC\/DGXIII\/B6, 1995.","DOI":"10.1016\/0142-0496(95)80047-6"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB22","unstructured":"EAGLE project, Software description and functional specification of the TTP demonstrator, Deliverable 3, CEC\/DGXIII\/B6, 1997."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB23","unstructured":"S2101 Project, User requirements for TTP services, CEC\/DGXIII\/B6, 1993."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB24","unstructured":"EUROMED-ETS project, Final Report, CEC\/DGXIII\/B6, 1998."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB25","unstructured":"A. Nilson, European Trusted Services (ETS) - Results of 1995 TTPs Projects. Final Report, Marinade Ltd., 1997"},{"key":"10.1016\/S0167-4048(00)08022-6_BIB26","unstructured":"KEYSTONE project, KEYSTONE deliverable 1.1: User Requirements Statement, 1998."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB27","unstructured":"KEYSTONE project, KEYSTONE deliverable 9.1: Final project report, 1998."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB28","unstructured":"CORBA, The Common Object Request Broker Architecture: Architecture and Specification, OMG, 1995."},{"key":"10.1016\/S0167-4048(00)08022-6_BIB29","unstructured":"CORBA, CORBA Services Specification, OMG, 1997."}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404800080226?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167404800080226?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,13]],"date-time":"2020-01-13T03:20:59Z","timestamp":1578885659000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404800080226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,12]]},"references-count":29,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2000,12]]}},"alternative-id":["S0167404800080226"],"URL":"https:\/\/doi.org\/10.1016\/s0167-4048(00)08022-6","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[2000,12]]}}}