{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,12]],"date-time":"2023-10-12T07:07:41Z","timestamp":1697094461238},"reference-count":34,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2003,8,1]],"date-time":"2003-08-01T00:00:00Z","timestamp":1059696000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Standards &amp; Interfaces"],"published-print":{"date-parts":[[2003,8]]},"DOI":"10.1016\/s0920-5489(03)00010-2","type":"journal-article","created":{"date-parts":[[2003,2,28]],"date-time":"2003-02-28T14:00:13Z","timestamp":1046440813000},"page":"391-409","source":"Crossref","is-referenced-by-count":9,"title":["Integrating PMI services in CORBA applications"],"prefix":"10.1016","volume":"25","author":[{"given":"Javier","family":"L\u00f3pez","sequence":"first","affiliation":[]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[]},{"given":"Juan J.","family":"Ortega","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 M.","family":"Troya","sequence":"additional","affiliation":[]},{"given":"Mariemma I.","family":"Yag\u00fce","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0920-5489(03)00010-2_BIB1","unstructured":"Object Management Group, The Common Object Request Broker: Architecture and Specification, 2002."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB2","unstructured":"Object Management Group, Resource Access Decision Facility Specification\u2014Version 1.0, 2001."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB3","unstructured":"World Wide Web Consortium, Resource Description Framework (RDF), http:\/\/www.w3.org\/RDF\/, 1999."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB4","series-title":"European Symposium on Research in Computer Security\u2014ESORICS'98, LNCS 1485","article-title":"Authorization in CORBA security","author":"Karjoth","year":"1998"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB5","series-title":"Secure Internet Programming: Security Issues for Mobile and Distributed Objects, LNCS 1603","article-title":"A view-based access control model for CORBA","author":"Brose","year":"1999"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB6","doi-asserted-by":"crossref","DOI":"10.1109\/CSAC.1999.816041","article-title":"Resource access decision service for CORBA-based distributed systems","author":"Beznosov","year":"1999"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB7","doi-asserted-by":"crossref","DOI":"10.1109\/ACSAC.2001.991562","article-title":"Verifiable identifiers in middleware security","author":"Lang","year":"2001"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB8","article-title":"Certificate-based access control for widely distributed resources","author":"Thompson","year":"1999"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB9","doi-asserted-by":"crossref","unstructured":"D.W. Chadwick, An X.509 role-based privilege management infrastructure, Global Infosecurity, 2002.","DOI":"10.1145\/507711.507732"},{"issue":"2","key":"10.1016\/S0920-5489(03)00010-2_BIB10","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","article-title":"Role-based access control models","volume":"29","author":"Sandhu","year":"1996","journal-title":"IEEE Computer"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB11","unstructured":"M.I. Yag\u00fce, On the Suitability of Existing Access Control and DRM Languages for Mobile Policies. University of M\u00e1laga. Department of Computer Science Tech. Rep. No. LCC-ITI-2002-10, 2002."},{"issue":"3","key":"10.1016\/S0920-5489(03)00010-2_BIB12","doi-asserted-by":"crossref","DOI":"10.1109\/4236.935172","article-title":"Securing XML documents with Author-X","volume":"5","author":"Bertino","year":"2001","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"10.1016\/S0920-5489(03)00010-2_BIB13","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1145\/505586.505590","article-title":"A fine-grained access control system for XML documents","volume":"5","author":"Damiani","year":"2002","journal-title":"ACM Transactions on Information and System Security"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB14","unstructured":"World Wide Web Consortium, XML-Schema, http:\/\/www.w3.org\/XML\/Schema, 2001."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB15","unstructured":"World Wide Web Consortium, RDF Vocabulary Description Language 1.0: RDF Schema, http:\/\/www.w3.org\/TR\/rdf-schema\/, 2002."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB16","unstructured":"Object Management Group, Security Service Specification\u2014Version 1.8, 2002."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB17","doi-asserted-by":"crossref","unstructured":"J. Kohl, B. Neuman, The Kerberos Network Authentication Service (V5), Internet RFC 1510, 1993.","DOI":"10.17487\/rfc1510"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB18","article-title":"Sesame V2 public key and authorization extensions to Kerberos","author":"McMahon","year":"1995"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB19","unstructured":"Netscape Communications, SSL 3.0 Specification, 1997."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB20","unstructured":"Object Management Group, The Authorization Token Layer Acquisition Service Specification, 2001."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB21","unstructured":"Object Management Group, Security Domain Membership Management Service, 2000."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB22","unstructured":"Object Management Group, The Common Object Request Broker: Architecture and Specification, Chapter 26: Secure Interoperability, 2002."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB23","unstructured":"Object Management Group, Naming Service Specification, 2001."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB24","unstructured":"ITU-T Recommendation X.509, Information Technology\u2014Open systems interconnection\u2014The Directory: Public-key and attribute certificate frameworks, 2000."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB25","unstructured":"ITU-T Recommendation X.509, Information Technology\u2014Open systems interconnection\u2014The Directory: Authentication Framework, 1997."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB26","unstructured":"B. Kaliski, A Layman's Guide to a Subset of ASN.1, BER, and DER, 1993."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB27","doi-asserted-by":"crossref","unstructured":"C. Ellison, et al., SPKI Certificate Theory, RFC 2693, IETF SPKI Working Group, 1999.","DOI":"10.17487\/rfc2693"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB28","doi-asserted-by":"crossref","unstructured":"S. Farrell, R. Housley, An Internet Attribute Certificate Profile for Authorization, RFC 3281, IETF PKIX Working Group, 2002.","DOI":"10.17487\/rfc3281"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB29","unstructured":"World Wide Web Consortium, XML-Signature Syntax and Processing, http:\/\/www.w3.org\/TR\/xmldsig-core\/, 2002."},{"key":"10.1016\/S0920-5489(03)00010-2_BIB30","series-title":"Secure Networking\u2014CQRE'99, LNCS 1740","article-title":"Cert'eM: certification system based on electronic mail service structure","author":"L\u00f3pez","year":"1999"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB31","article-title":"An infrastructure for secure content distribution","volume":"LNCS 2513","author":"L\u00f3pez","year":"2002"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB32","article-title":"XML-based distributed access control system","volume":"LNCS 2455","author":"L\u00f3pez","year":"2002"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB33","unstructured":"World Wide Web Consortium, XML Path Language (XPath), http:\/\/www.w3.org\/TR\/xpath.html"},{"key":"10.1016\/S0920-5489(03)00010-2_BIB34","article-title":"Secure content distribution for digital libraries","volume":"LNCS 2555","author":"Yag\u00fce","year":"2002"}],"container-title":["Computer Standards &amp; Interfaces"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000102?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0920548903000102?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,3,12]],"date-time":"2020-03-12T13:08:28Z","timestamp":1584018508000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0920548903000102"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,8]]},"references-count":34,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2003,8]]}},"alternative-id":["S0920548903000102"],"URL":"https:\/\/doi.org\/10.1016\/s0920-5489(03)00010-2","relation":{},"ISSN":["0920-5489"],"issn-type":[{"value":"0920-5489","type":"print"}],"subject":[],"published":{"date-parts":[[2003,8]]}}}