{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T22:50:53Z","timestamp":1725490253090},"reference-count":9,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/enabl.2003.1231383","type":"proceedings-article","created":{"date-parts":[[2004,1,23]],"date-time":"2004-01-23T23:33:03Z","timestamp":1074900783000},"page":"59-64","source":"Crossref","is-referenced-by-count":0,"title":["WebDAVA: An administrator-free approach to Web file-sharing"],"prefix":"10.1109","author":[{"given":"A.","family":"Levine","sequence":"first","affiliation":[]},{"given":"V.","family":"Prevelakis","sequence":"additional","affiliation":[]},{"given":"J.","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"S.","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"A.D.","family":"Keromytis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/35037.35059"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2002.1023787"},{"key":"ref6","article-title":"Design and Implementation of the Sun Network File System","author":"sandberg","year":"1985","journal-title":"Proceedings of the Summer USENIX Conference"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319160"},{"key":"ref8","first-page":"215","article-title":"Certificate-based access control for widely distributed resources","author":"thompson","year":"1999","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref7","first-page":"211","article-title":"Capability File Names: Separating Authorization from User Management in an Internet File System","author":"regan","year":"2001","journal-title":"Proceedings of the USENIX Security Symposium"},{"key":"ref2","article-title":"The KeyNote Trust Management System Version 2","author":"blaze","year":"1999","journal-title":"RFC 2704"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HPDC.1998.709956"},{"key":"ref1","first-page":"15","article-title":"The CRISIS Wide Area Security Architecture","author":"belani","year":"1998","journal-title":"Proceedings of the USENIX Security Symposium"}],"event":{"name":"Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises","acronym":"ENABL-03","location":"Linz, Austria"},"container-title":["WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8713\/27586\/01231383.pdf?arnumber=1231383","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,13]],"date-time":"2017-03-13T20:16:52Z","timestamp":1489436212000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1231383\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/enabl.2003.1231383","relation":{},"subject":[]}}