{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T16:19:02Z","timestamp":1743265142962},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1109\/icis.2005.112","type":"proceedings-article","created":{"date-parts":[[2006,10,11]],"date-time":"2006-10-11T11:41:15Z","timestamp":1160566875000},"page":"233-238","source":"Crossref","is-referenced-by-count":5,"title":["Security service framework for home network"],"prefix":"10.1109","author":[{"family":"Zhefan Jiang","sequence":"first","affiliation":[]},{"family":"Sangok Kim","sequence":"additional","affiliation":[]},{"family":"Kanghee Lee","sequence":"additional","affiliation":[]},{"family":"Hyunchul Bae","sequence":"additional","affiliation":[]},{"family":"Sangwook Kim","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Role based access control","year":"0","key":"15"},{"journal-title":"Java Embedded Server","year":"0","key":"16"},{"journal-title":"802 1X Port-Based Network Access Control","year":"0","key":"13"},{"year":"0","key":"14"},{"journal-title":"Detecting wireless LAN MAC address spoofing","year":"2003","author":"wright","key":"11"},{"journal-title":"Hack Proofing Your Wireless Networks","year":"2002","author":"christian","key":"12"},{"key":"3","article-title":"Home network security","author":"ellison","year":"2002","journal-title":"Intel Technology Journal"},{"journal-title":"Wireless Security and Monitoring for the Home Network","year":"2003","author":"turner","key":"2"},{"journal-title":"Home Networking","year":"0","key":"1"},{"journal-title":"Wireless Security-Models Threats and Solutions","year":"2002","author":"randall","key":"10"},{"journal-title":"Real World Linux Security Intrusion Prevention Detection and Recovery","year":"2001","author":"toxen","key":"7"},{"journal-title":"SEED Homepage","year":"0","key":"6"},{"journal-title":"The OSGi HomePage","year":"0","key":"5"},{"journal-title":"Hack Proofing Your Wireless Networks","year":"2002","author":"christian","key":"4"},{"journal-title":"IP-tables","year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/TENCON.2000.888744"}],"event":{"name":"Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05)","start":{"date-parts":[[2005,7,16]]},"location":"Jeju Island, South Korea","end":{"date-parts":[[2005,7,16]]}},"container-title":["Fourth Annual ACIS International Conference on Computer and Information Science (ICIS'05)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10154\/32462\/01515407.pdf?arnumber=1515407","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,14]],"date-time":"2017-03-14T16:16:02Z","timestamp":1489508162000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1515407\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icis.2005.112","relation":{},"subject":[],"published":{"date-parts":[[2005]]}}}