{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:32:29Z","timestamp":1750307549354,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,3,22]],"date-time":"2010-03-22T00:00:00Z","timestamp":1269216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,3,22]]},"DOI":"10.1145\/1774088.1774233","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"706-712","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CapaCon"],"prefix":"10.1145","author":[{"given":"Mitsuhiro","family":"Mabuchi","sequence":"first","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Yasushi","family":"Shinjo","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Koji","family":"Hasebe","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Akira","family":"Sato","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]},{"given":"Kazuhiko","family":"Kato","sequence":"additional","affiliation":[{"name":"University of Tsukuba, Tsukuba, Ibaraki, Japan"}]}],"member":"320","published-online":{"date-parts":[[2010,3,22]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"93","volume-title":"Proc. of USENIX Summer Conference","author":"Accetta M.","year":"1986","unstructured":"M. Accetta , R. Baron , W. Bolosky , D. Rashid , A. Tevanian , and M. Young . Mach: A New Kernel Foundation for UNIX Development , In Proc. of USENIX Summer Conference , pp. 93 -- 112 , 1986 . M. Accetta, R. Baron, W. Bolosky, D. Rashid, A. Tevanian, and M. Young. Mach: A New Kernel Foundation for UNIX Development, In Proc. of USENIX Summer Conference, pp. 93--112, 1986."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"O. Andreasson. Iptables Tutorial 1.2.0 2005.  O. Andreasson. Iptables Tutorial 1.2.0 2005.","DOI":"10.1137\/1.9780898717891.ch1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/195792.195795"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3501"},{"key":"e_1_3_2_1_5_1","first-page":"2007","author":"Digital Living Network DLNA","year":"2007","unstructured":"DLNA ( Digital Living Network Alliance). DLNA Overview and Vision Whitepaper 2007 , 2007 . DLNA (Digital Living Network Alliance). DLNA Overview and Vision Whitepaper 2007, 2007.","journal-title":"DLNA Overview and Vision Whitepaper"},{"key":"e_1_3_2_1_6_1","unstructured":"C. Ellison. UPnP Security Ceremonies Design Document for UPnP Device Architecture 1.0 2003.  C. Ellison. UPnP Security Ceremonies Design Document for UPnP Device Architecture 1.0 2003."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247508"},{"key":"e_1_3_2_1_8_1","first-page":"114","volume":"4","author":"Hirano M.","year":"2008","unstructured":"M. Hirano , T. Okuda , and S. Yamaguchi . Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership, IPSJ Digital Courier , Vol. 4 , pp. 114 -- 127 , 2008 . M. Hirano, T. Okuda, and S. Yamaguchi. Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership, IPSJ Digital Courier, Vol. 4, pp. 114--127, 2008.","journal-title":"Design and Implementation of an Inter-Device Authentication Framework Guaranteeing Explicit Ownership, IPSJ Digital Courier"},{"key":"e_1_3_2_1_9_1","volume-title":"RFC","author":"Klensin J.","year":"2008","unstructured":"J. Klensin . Simple Mail Transfer Protocol , RFC 5321, Oct. 2008 . J. Klensin. Simple Mail Transfer Protocol, RFC 5321, Oct. 2008."},{"key":"e_1_3_2_1_10_1","volume-title":"Capability-Based Computer Systems","author":"Levy H. M.","year":"1984","unstructured":"H. M. Levy . Capability-Based Computer Systems , Digital Press , 1984 . H. M. Levy. Capability-Based Computer Systems, Digital Press, 1984."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICN.2008.72"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.53354"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC2222"},{"key":"e_1_3_2_1_14_1","first-page":"211","volume-title":"Proc. of USENIX Security Symposium","author":"Regan J. T.","year":"2001","unstructured":"J. T. Regan , and C. D. Jensen . Capability File Names: Separating Authorization from User Management in an Internet File System , In Proc. of USENIX Security Symposium , pp. 211 -- 233 , 2001 . J. T. Regan, and C. D. Jensen. Capability File Names: Separating Authorization from User Management in an Internet File System, In Proc. of USENIX Security Symposium, pp. 211--233, 2001."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC3261"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319163"},{"key":"e_1_3_2_1_17_1","volume-title":"Operating System Concepts","author":"Silberschatz A.","year":"2008","unstructured":"A. Silberschatz , P. B. Galvin , and G. Gagne . Operating System Concepts , Wiley , 2008 . A. Silberschatz, P. B. Galvin, and G. Gagne. Operating System Concepts, Wiley, 2008."},{"key":"e_1_3_2_1_18_1","volume-title":"Fundamental of Symbian OS","author":"Stichbury J.","year":"2006","unstructured":"J. Stichbury , and M. Jacobs . The Accredited Symbian Developer Primer , Fundamental of Symbian OS , John Wiley & amp; Sons Inc, 2006 . J. Stichbury, and M. Jacobs. The Accredited Symbian Developer Primer, Fundamental of Symbian OS, John Wiley &amp; Sons Inc, 2006."},{"key":"e_1_3_2_1_19_1","volume-title":"System Administration Guide: Security Services","author":"Sun Microsystems Inc.","year":"2008","unstructured":"Sun Microsystems Inc. System Administration Guide: Security Services , 2008 . Sun Microsystems Inc. System Administration Guide: Security Services, 2008."},{"issue":"12","key":"e_1_3_2_1_20_1","first-page":"1441","volume":"21","author":"Suzuki K.","year":"2007","unstructured":"K. Suzuki , G. Mito , H. Kawamoto , Y. Hasegawa , and Y. Sankai . Intention-Based Walking Support for Paraplegia Patients with Robot Suit HAL, Advanced Robotics , Vol. 21 , No. 12 , pp. 1441 -- 1469 , 2007 . K. Suzuki, G. Mito, H. Kawamoto, Y. Hasegawa, and Y. Sankai. Intention-Based Walking Support for Paraplegia Patients with Robot Suit HAL, Advanced Robotics, Vol. 21, No. 12, pp. 1441--1469, 2007.","journal-title":"Intention-Based Walking Support for Paraplegia Patients with Robot Suit HAL, Advanced Robotics"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2006.09.009"},{"key":"e_1_3_2_1_22_1","volume-title":"UPnP Device Architecture 1.0","author":"Forum P","year":"2008","unstructured":"UPn P Forum . UPnP Device Architecture 1.0 , 2008 . UPnP Forum. UPnP Device Architecture 1.0, 2008."},{"key":"e_1_3_2_1_23_1","first-page":"15","volume-title":"Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX'01)","author":"Watson R. N. M.","year":"2001","unstructured":"R. N. M. Watson . TrustedBSD : Adding Trusted Operating System Features to FreeBSD , In Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX'01) , pp. 15 -- 28 , 2001 . R. N. M. Watson. TrustedBSD: Adding Trusted Operating System Features to FreeBSD, In Proc. of the FREENIX Track: 2001 USENIX Annual Technical Conference (FREENIX'01), pp. 15--28, 2001."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/647253.720287"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/355616.364017"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"W. Yeong T. Howes S. Kille. X.500 Lightweight Directory Access Protocol RFC1487 July. 1993.  W. Yeong T. Howes S. Kille. X.500 Lightweight Directory Access Protocol RFC1487 July. 1993.","DOI":"10.17487\/rfc1487"}],"event":{"name":"SAC'10: The 2010 ACM Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Sierre Switzerland","acronym":"SAC'10"},"container-title":["Proceedings of the 2010 ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774233","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1774088.1774233","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:23:35Z","timestamp":1750249415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1774088.1774233"}},"subtitle":["access control mechanism for inter-device communications through TCP connections"],"short-title":[],"issued":{"date-parts":[[2010,3,22]]},"references-count":26,"alternative-id":["10.1145\/1774088.1774233","10.1145\/1774088"],"URL":"https:\/\/doi.org\/10.1145\/1774088.1774233","relation":{},"subject":[],"published":{"date-parts":[[2010,3,22]]},"assertion":[{"value":"2010-03-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}