{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:40:49Z","timestamp":1729636849584,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/csac.2002.1176288","type":"proceedings-article","created":{"date-parts":[[2003,6,26]],"date-time":"2003-06-26T11:35:00Z","timestamp":1056627300000},"page":"161-171","source":"Crossref","is-referenced-by-count":5,"title":["A security architecture for object-based distributed systems"],"prefix":"10.1109","author":[{"given":"B.C.","family":"Popescu","sequence":"first","affiliation":[]},{"given":"M.","family":"van Steen","sequence":"additional","affiliation":[]},{"given":"A.S.","family":"Tanenbaum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"ISO\/IEC 9798&#x2013;3 authentication SASL mechanism","author":"zuccherato","year":"2001","journal-title":"RFC3163"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/288090.288111"},{"key":"ref11","article-title":"A Secure Environment for Untrusted Helper Applications","author":"goldberg","year":"1996","journal-title":"Proc 6th Usenix Security Symp"},{"key":"ref12","first-page":"94303","author":"gong","year":"1999","journal-title":"Inside Java 2 Platform Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1996.546177"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/3-540-45559-0_6","article-title":"An architecture for distributed OASIS services","author":"hine","year":"2000","journal-title":"Proc Middleware 2000"},{"key":"ref15","first-page":"197","article-title":"A Common Criteria Framework for the Evaluation of Information Technology Security Evaluation","author":"kruger","year":"1997","journal-title":"IFIP TC11 13th International Conference on Information Security (SEC'97)"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379239"},{"key":"ref17","first-page":"236","article-title":"A Security Design for a Wide-Area Distributed System","volume":"1787","author":"leiwo","year":"1999","journal-title":"Proc Second International Conference Information Security and Cryptology (ICISC'99)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"journal-title":"A Trust Model for Cooperative Content Distribution Networks Technical report","year":"2001","author":"pierre","key":"ref19"},{"key":"ref28","first-page":"59","article-title":"Publius: A Robust, Tamper-Evident, Censorship-Resistant, Web Publishing System","author":"waldman","year":"2000","journal-title":"Proc 9th USENIX Security Symposium"},{"key":"ref4","first-page":"95472","author":"anderson","year":"2001","journal-title":"Peer-to-Peer - Harnessing the power of disruptive technologies O'Reilly"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/6\/1\/304"},{"journal-title":"CORBA Security Service Specification Version 1 7","year":"2001","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/FTDCS.1999.818783"},{"key":"ref29","volume":"10","author":"wulf","year":"1995","journal-title":"A New Model of Security for Distributed Systems Technical Report CS-95&#x2013;34"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/44.5.340"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/511495.511496"},{"key":"ref7","article-title":"A Law-Abiding Peer-to-Peer Network for Free-Software Distribution","author":"bakker","year":"2002","journal-title":"Proc IEEE Int l Symp Network Computing and Applications"},{"journal-title":"OMG document formal\/2007","article-title":"The Common Object Request Broker: Architecture and Specification, revision 2.6","year":"2000","key":"ref2"},{"journal-title":"Inside Distibuted COM","year":"1998","author":"eddon","key":"ref9"},{"year":"1995","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1009149"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/293411.293778"},{"article-title":"A Certificate Revocation Scheme for a Large-Scale Highly Replicated Distributed System","year":"2002","author":"popescu","key":"ref21"},{"key":"ref24","article-title":"Object Adapters","volume":"9","author":"schmidt","year":"1997","journal-title":"Concepts and Terminology C++ Report"},{"article-title":"SDSI - A Simple Distributed Security Infrastructure. Presented at CRYPTO'96 Rumpsession","year":"1996","author":"rivest","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/4434.749137"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/35.649334"}],"event":{"name":"Eighteenth Annual Computer Security Applications Conference","acronym":"CSAC-02","location":"Las Vegas, NV, USA"},"container-title":["18th Annual Computer Security Applications Conference, 2002. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8386\/26404\/01176288.pdf?arnumber=1176288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:46:19Z","timestamp":1497552379000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1176288\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/csac.2002.1176288","relation":{},"subject":[]}}