{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:54:27Z","timestamp":1750308867334,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,20]],"date-time":"2012-06-20T00:00:00Z","timestamp":1340150400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,20]]},"DOI":"10.1145\/2295136.2295161","type":"proceedings-article","created":{"date-parts":[[2012,6,20]],"date-time":"2012-06-20T13:33:01Z","timestamp":1340199181000},"page":"127-130","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Encryption-enforced access control for an RFID discovery service"],"prefix":"10.1145","author":[{"given":"Florian","family":"Kerschbaum","sequence":"first","affiliation":[{"name":"Technical University, Dresden, Germany"}]},{"given":"Leonardo","family":"Weiss Ferreira Chaves","sequence":"additional","affiliation":[{"name":"SAP AG, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2012,6,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 13th International Conference on Management of Data COMAD'06","author":"Beier S.","year":"2006","unstructured":"S. Beier , T. Grandison , K. Kailing , and R. Rantzau . Discovery Services - Enabling RFID Traceability in EPCglobal Networks . In Proceedings of the 13th International Conference on Management of Data COMAD'06 , 2006 . S. Beier, T. Grandison, K. Kailing, and R. Rantzau. Discovery Services - Enabling RFID Traceability in EPCglobal Networks. In Proceedings of the 13th International Conference on Management of Data COMAD'06, 2006."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-010-9062-0"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing SECPERU'05","author":"Fabian B.","year":"2005","unstructured":"B. Fabian , O. G\u00fcnther , and S. Spiekermann . Security Analysis of the Object Name Service . In Proceedings of the International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing SECPERU'05 , 2005 . B. Fabian, O. G\u00fcnther, and S. Spiekermann. Security Analysis of the Object Name Service. In Proceedings of the International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing SECPERU'05, 2005."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","DOI":"10.1002\/0470868023","volume-title":"RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification","author":"Finkenzeller K.","year":"2003","unstructured":"K. Finkenzeller . RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification . John Wiley & Sons, Inc. , 2003 . K. Finkenzeller. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification. John Wiley & Sons, Inc., 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECCOM.2007.4550368"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809842.1809873"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1926325.1926343"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1514274.1514281"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/11766155_29"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2011.78"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/MDM.2012.27"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJIPT.2007.016219"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1400181.1400209"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.977758"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2008.37"}],"event":{"name":"SACMAT '12: 17th ACM Symposium on Access Control Models and Technologies","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Newark New Jersey USA","acronym":"SACMAT '12"},"container-title":["Proceedings of the 17th ACM symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2295136.2295161","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2295136.2295161","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:15:09Z","timestamp":1750281309000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2295136.2295161"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,20]]},"references-count":15,"alternative-id":["10.1145\/2295136.2295161","10.1145\/2295136"],"URL":"https:\/\/doi.org\/10.1145\/2295136.2295161","relation":{},"subject":[],"published":{"date-parts":[[2012,6,20]]},"assertion":[{"value":"2012-06-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}