{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:01:38Z","timestamp":1754157698656,"version":"3.41.2"},"reference-count":6,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2005,12,1]],"date-time":"2005-12-01T00:00:00Z","timestamp":1133395200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2005,12]]},"DOI":"10.1108\/09685220510627296","type":"journal-article","created":{"date-parts":[[2007,1,15]],"date-time":"2007-01-15T18:09:08Z","timestamp":1168884548000},"page":"419-434","source":"Crossref","is-referenced-by-count":0,"title":["Intelligent authentication, authorization, and administration (I3A)"],"prefix":"10.1108","volume":"13","author":[{"given":"Dan","family":"Eigeles","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"b4","unstructured":"Eigeles, D. (2001), \u201cWar of brains: a training exercise for computer security trainers\u201d, Computer Security Journal, Vol. XVII No. 1."},{"key":"b8","unstructured":"Ellison, C. and Schneier, B. (2000), \u201cTen risks of PKI: what you're not being told about public key infrastructure\u201d, Computer Security Journal, Vol. XVI No. 1, pp. 1\u20107."},{"key":"b16","unstructured":"Guida, R. (2000), \u201cExpert debate pros and cons of PKI\u201d, Alert, CSI, No. 204, pp. 1, 8."},{"key":"b20","unstructured":"Kent, S. (2000), \u201cPKI debate rages on: rebuttal to \u2018Ten Risks of PKI\u2019\u201d, Alert, No. 206, pp. 1, 8."},{"key":"b27","unstructured":"Power, R. (2002), \u201cHypeland security: two steps forward, one step back\u201d, Alert, Computer Security Institute, April, pp. 2\u20106."},{"key":"b28","unstructured":"Stout, G. (2002), \u201cAssessment of a public key infrastructure: methodology and issues\u201d, Computer Security Journal, Vol. XVIII Nos 3\/4."}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220510627296","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220510627296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:08:56Z","timestamp":1753402136000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/13\/5\/419-434\/171798"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12]]},"references-count":6,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2005,12]]}},"alternative-id":["10.1108\/09685220510627296"],"URL":"https:\/\/doi.org\/10.1108\/09685220510627296","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2005,12]]}}}