{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T09:11:45Z","timestamp":1730193105091,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/.2006.1629438","type":"proceedings-article","created":{"date-parts":[[2006,5,25]],"date-time":"2006-05-25T20:26:01Z","timestamp":1148588761000},"page":"449-454","source":"Crossref","is-referenced-by-count":0,"title":["Enabling Mobility in Enterprise Security Management"],"prefix":"10.1109","author":[{"given":"W.","family":"Claycomb","sequence":"first","affiliation":[]},{"family":"Dongwan Shin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775434"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344309"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.807"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/344287.344308"},{"journal-title":"RSA ClearTrust Advanced User Management Module","year":"2004","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/984334.984339"},{"journal-title":"SDSI A Simple Distributed Security Infrastructure","year":"1996","author":"rivest","key":"12"},{"journal-title":"Common Information Model (CIM) Infrastructure Specification Version 2 3","year":"2004","key":"3"},{"key":"2","article-title":"The KeyNote trust-management system version 2","volume":"2704","author":"blaze","year":"1999","journal-title":"RFC"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.511"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507717"},{"journal-title":"ITU-T Recommendation X 509 Information Technology Open Systems Interconnection - the Directory Public-Key and Attribute Certificate Frameworks","year":"2000","key":"7"},{"journal-title":"ITU-T Recommendation T 128SHARE -Application Sharing","year":"1997","key":"6"},{"journal-title":"Code of Practice for Information Security Management","year":"2000","key":"5"},{"journal-title":"Extranet Access Management Magic Quadrant Gartner Research Note (ID M-13-6853)","year":"2001","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507718"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35587-0_4"}],"event":{"name":"2006 IEEE International Performance Computing and Communications Conference","location":"Phoenix, AX, USA"},"container-title":["2006 IEEE International Performance Computing and Communications Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10845\/34183\/01629438.pdf?arnumber=1629438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T16:24:24Z","timestamp":1489595064000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1629438\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/.2006.1629438","relation":{},"subject":[]}}