{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:38Z","timestamp":1754157698948,"version":"3.41.2"},"reference-count":5,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1108\/09685220510627278","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T18:24:18Z","timestamp":1168885458000},"page":"379-398","source":"Crossref","is-referenced-by-count":0,"title":["A good\u2010practice guidance on the use of PKI services in the public sector of the European Union member states"],"prefix":"10.1108","volume":"13","author":[{"given":"Stefanos","family":"Gritzalis","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"b4","unstructured":"Ellison, C. and Schneier, B. (2000), \u201cTen risks of PKI: what you're not being told about public key infrastructure\u201d, Computer Security Journal, Vol. XVI No. 1, available at: www.counterpane.com\/pki\u2010risks.pdf."},{"key":"b5","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(93)90056-B"},{"key":"b10","unstructured":"J\u00f8sang, A., Meling, H. and Lu, M. (1999), \u201cThe development of public key infrastructures: are we on the right path?\u201d, Proceedings of the Norwegian Informatics Conference (NIK'99), available at: www.item.ntnu.no\/ \u223c\u2009meling\/publica\u2010ti\u2010ons\/papers\/pki\u2010nik1999.pdf."},{"key":"b11","unstructured":"Koorn, R., Van Walsem, P. and Lundin, M. (2002), \u201cAuditing and certification of a public key infrastructure\u201d, Information Systems Control Journal, Vol. 5, available at: www.kpmg.nl\/Docs\/Information_Risk_Management\/Publications\/20021003_RK_Auditing_and_Certification.pdf."},{"key":"b16","unstructured":"Silverman, R.D. (2002), \u201cA cost\u2010based security analysis of symmetric and asymmetric key lengths\u201d, RSA Laboratories Bulletin, No. 13, available at: www.rsasecurity.com\/rsalabs\/bulletins\/bulletin13.html (accessed November 2001)."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510627278","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220510627278","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:56Z","timestamp":1753402136000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/5\/379-398\/171794"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12]]},"references-count":5,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,12]]}},"alternative-id":["10.1108\/09685220510627278"],"URL":"https:\/\/doi.org\/10.1108\/09685220510627278","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,12]]}}}