{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T04:27:16Z","timestamp":1648960036034},"reference-count":25,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2000,2,1]],"date-time":"2000-02-01T00:00:00Z","timestamp":949363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2000,2]]},"DOI":"10.1016\/s0167-739x(99)00060-6","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T18:12:49Z","timestamp":1027620769000},"page":"361-372","source":"Crossref","is-referenced-by-count":0,"title":["Scaling issues in large PKI communities"],"prefix":"10.1016","volume":"16","author":[{"given":"A.P.","family":"Varvitsiotis","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/S0167-739X(99)00060-6_BIB1","unstructured":"C. Adams, P. Cain, D. Pinkas, R. Zuccherato, Internet X.509 Public Key Infrastructure-Time Stamp Protocols, IETF Draft PKIX Timestamp, September 1998."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB2","doi-asserted-by":"crossref","unstructured":"S.M. Bellovin, M. Merritt, Encrypted key exchange: password-based protocols secure against dictionary attacks, in: Proc. IEEE Conf. on Security and Privacy, 1992.","DOI":"10.1109\/RISP.1992.213269"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB3","unstructured":"M. Branchaud, Internet Public Key Infrastructure: Caching the online Certificate Status Protocol, IETF Draft OCSP caching-0, April 1998."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB4","doi-asserted-by":"crossref","unstructured":"T. Dierks, C. Allen, The TLS Protocol Version 1.0, TLSv1: IETF Draft tls protocol-06, November 1998.","DOI":"10.17487\/rfc2246"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB5","doi-asserted-by":"crossref","unstructured":"W. Diffie, M.E. Hellman, New directions in cryptography, IEEE Transactions on Information Theory IT-22 (6) (1977).","DOI":"10.1109\/TIT.1976.1055638"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB6","doi-asserted-by":"crossref","unstructured":"R. Fielding, J. Gettys, J. Mogul, H. Frystyk, T. Berners-Lee, Hypertext Transfer Protocol-HTTP\/1.1, RFC 2068, January 1997.","DOI":"10.17487\/rfc2068"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB7","unstructured":"A. Freier, A. Karlton, P. Kocher, The SSL 3.0 Protocol, Netscape Communications Corp., November 1996."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB8","unstructured":"P. Hallam-Baker, W. Ford, Internet X.509 Public Key Infrastructure-Enhanced CRL Distribution Protocols, PKIX-ocdp: IETF Draft pkix ocdp-1, August 1998."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB9","doi-asserted-by":"crossref","unstructured":"R. Housley, W. Ford, W. Polk, D. Solo, Internet X.509 Public Key Infrastructure-Certificate and CRL Profile, PKIX-part1: IETF Draft pkix part1-11, September 1998.","DOI":"10.17487\/rfc2459"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB10","unstructured":"ITU-T Recommendation X.500 and ISO\/IEC 9594-1:1997, Information technology-Open Systems Interconnection, The Directory: Overview of concepts, models and services, 1997."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB11","unstructured":"ITU-T Recommendation X.501 and ISO\/IEC 9594-2:1997, Information technology-Open Systems Interconnection, The Directory: Models, 1997."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB12","unstructured":"ITU-T Recommendation X.509 and ISO\/IEC 9594-8:1997, Information technology-Open System Interconnection, The Directory: Authentication framework, 1997."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB13","doi-asserted-by":"crossref","unstructured":"B. Kaliski, PCKS#1: RSA Encryption Version 1.5, RFC 2313, March 1998.","DOI":"10.17487\/rfc2313"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB14","doi-asserted-by":"crossref","unstructured":"B. Kaliski, PKCS#10: Certification Request Syntax Version 1.5, RFC 2314, March 1998.","DOI":"10.17487\/rfc2314"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB15","doi-asserted-by":"crossref","unstructured":"A. Menezes, P. Van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton 1996.","DOI":"10.1201\/9781439821916"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB16","doi-asserted-by":"crossref","unstructured":"R.C. Merkle, Secure communications over insecure channels, Communications of the ACM 21(4) (1978).","DOI":"10.1145\/359460.359473"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB17","doi-asserted-by":"crossref","unstructured":"M. Myers, et al., X.509 Internet Public Key Infrastructure: Online Certificate Status Protocol, IETF Draft ocsp-7, September 1998.","DOI":"10.17487\/rfc2560"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB18","unstructured":"NIST, FIPS PUB 180: Secure Hash Standard, April 1995."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB19","doi-asserted-by":"crossref","unstructured":"R. Rivest, A. Shamir, L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978).","DOI":"10.1145\/359340.359342"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB20","unstructured":"B. Schneier, Applied Cryptography 2nd ed., Wiley. New York, 1996."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB21","unstructured":"J.G. Steiner, B.C. Neuman, J.I. Schiller, Kerberos: An authentication service for open network systems, in: Proc. Usenix 1988 Conference, 1988."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB22","unstructured":"G. Tsudik, Access Control and Policy Enforcement in Internetworks, Ph.D. Dissertation, Computer Science Department, University of Southern California, USA, April 1991."},{"key":"10.1016\/S0167-739X(99)00060-6_BIB23","doi-asserted-by":"crossref","unstructured":"A. Varvitsiotis, D. Polemi, A. Marsh, Euromed-Java: trusted-third-party services for securing medical Java applets, in: Proc. 5th ESORICS, Springer, Berlin, 1998.","DOI":"10.1007\/BFb0055865"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB24","doi-asserted-by":"crossref","unstructured":"M. Wahl, A. Couldbeck, T. Howes, S. Kille, Lightweight Directory Access Protocol (v3): Attribute Syntax Definitions, RFC 2252, December 1997.","DOI":"10.17487\/rfc2252"},{"key":"10.1016\/S0167-739X(99)00060-6_BIB25","doi-asserted-by":"crossref","unstructured":"M. Wahl, A Summary of the X.500(96) User Schema for use with LDAPv3, RFC 2256, December 1997.","DOI":"10.17487\/rfc2256"}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X99000606?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X99000606?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,1,14]],"date-time":"2020-01-14T19:35:48Z","timestamp":1579030548000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X99000606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,2]]},"references-count":25,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,2]]}},"alternative-id":["S0167739X99000606"],"URL":"https:\/\/doi.org\/10.1016\/s0167-739x(99)00060-6","relation":{},"ISSN":["0167-739X"],"issn-type":[{"value":"0167-739X","type":"print"}],"subject":[],"published":{"date-parts":[[2000,2]]}}}