{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:14:25Z","timestamp":1750220065548,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[1995,12,11]],"date-time":"1995-12-11T00:00:00Z","timestamp":818640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[1995,12,11]]},"DOI":"10.1145\/3592626.3592657","type":"proceedings-article","created":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T20:50:55Z","timestamp":1691614255000},"page":"381-395","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["CCI-Based Web Security: A Design Using PGP"],"prefix":"10.1145","author":[{"given":"Judson D.","family":"Weeks","sequence":"first","affiliation":[{"name":"Software Development Group, National Center for Supercomputing Applications, Champaign, IL"}]},{"given":"Adam","family":"Cain","sequence":"additional","affiliation":[{"name":"Software Development Group, National Center for Supercomputing Applications, Champaign, IL"}]},{"given":"Briand","family":"Sanderson","sequence":"additional","affiliation":[{"name":"Software Development Group, National Center for Supercomputing Applications, Champaign, IL"}]}],"member":"320","published-online":{"date-parts":[[2023,8,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Private Communication Technology Protocol","author":"Benaloh J.","year":"1995","unstructured":"Benaloh , J. et al . Private Communication Technology Protocol , September , 1995 . http:\/\/www.microsoft.com\/windows\/ie\/pct.htm Benaloh, J. et al. Private Communication Technology Protocol, September, 1995. http:\/\/www.microsoft.com\/windows\/ie\/pct.htm"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645792.668170"},{"key":"e_1_3_2_1_3_1","volume-title":"August","author":"Black P.","year":"1995","unstructured":"Black , P. Software Development Interface , August , 1995 . http:\/\/www.spyglass.com\/techspec\/sdi_spec.html Black, P. Software Development Interface, August, 1995. http:\/\/www.spyglass.com\/techspec\/sdi_spec.html"},{"key":"e_1_3_2_1_4_1","volume-title":"August","author":"Cain A.","year":"1995","unstructured":"Cain , A. Kerberizing the Web , August , 1995 . http:\/\/snapple.ncsa.uiuc.edu\/adam\/khttp\/intro.html Cain, A. Kerberizing the Web, August, 1995. http:\/\/snapple.ncsa.uiuc.edu\/adam\/khttp\/intro.html"},{"key":"e_1_3_2_1_5_1","volume-title":"A Protocol Specification","author":"Cain A.","year":"1995","unstructured":"Cain , A. and J. Weeks . Web Support of PGP Via the Common Client Interface , A Protocol Specification , October , 1995 . http:\/\/www.ncsa.uiuc.edu\/InformationServers\/WebSecurity\/pgp-cci-spec.html Cain, A. and J. Weeks. Web Support of PGP Via the Common Client Interface, A Protocol Specification, October, 1995. http:\/\/www.ncsa.uiuc.edu\/InformationServers\/WebSecurity\/pgp-cci-spec.html"},{"key":"e_1_3_2_1_6_1","volume":"1750","author":"Eastlake D","unstructured":"Eastlake , D , S. Crocker , and J. Schiller. RFC 1750 : Randomness Recommendations for Security, December, 1994. ftp:\/\/ftp.intemic.net\/rfc\/rfc1750.txt Eastlake, D, S. Crocker, and J. Schiller. RFC 1750: Randomness Recommendations for Security, December, 1994. ftp:\/\/ftp.intemic.net\/rfc\/rfc1750.txt","journal-title":"J. Schiller. RFC"},{"key":"e_1_3_2_1_7_1","volume-title":"O'Reilly & Associates","author":"Garfinkel S.","year":"1994","unstructured":"Garfinkel , S. PGP: Pretty Good Privacy , O'Reilly & Associates , 1994 . Garfinkel, S. PGP: Pretty Good Privacy, O'Reilly & Associates, 1994."},{"key":"e_1_3_2_1_8_1","volume-title":"June","author":"Hickman K.","year":"1995","unstructured":"Hickman , K. and T. Elgamal . The SSL Protocol , June , 1995 . ftp:\/\/ietf.cnri.reston.va.us\/intemet-drafts\/draft-hickman-netscape-ssl-01.txt Hickman, K. and T. Elgamal. The SSL Protocol, June, 1995. ftp:\/\/ietf.cnri.reston.va.us\/intemet-drafts\/draft-hickman-netscape-ssl-01.txt"},{"key":"e_1_3_2_1_9_1","volume-title":"May","author":"Hostetler J.","year":"1995","unstructured":"Hostetler , J. Spyglass Security Protocol Module API , May , 1995 . http:\/\/www.spyglass.com\/techspec\/spm_spec.html Hostetler, J. Spyglass Security Protocol Module API, May, 1995. http:\/\/www.spyglass.com\/techspec\/spm_spec.html"},{"key":"e_1_3_2_1_10_1","volume-title":"March","author":"Hostetler J.","year":"1995","unstructured":"Hostetler , J. et al. A Proposed Extension to HTTP: Digest Access Authentication , March , 1995 . ftp.\/\/ds.internic.net\/intemet-drafts\/draft-ietf-http-digest-aa-01.txt Hostetler, J. et al. A Proposed Extension to HTTP: Digest Access Authentication, March, 1995. ftp.\/\/ds.internic.net\/intemet-drafts\/draft-ietf-http-digest-aa-01.txt"},{"key":"e_1_3_2_1_11_1","volume-title":"WEBextra","author":"Husum D.","year":"1995","unstructured":"Husum , D. ed. Security Flaw Found in Netscape Navigator. Fix is in the Works , WEBextra , September , 1995 . http:\/\/www.tgc.com\/websec\/20460.html Husum, D. ed. Security Flaw Found in Netscape Navigator. Fix is in the Works, WEBextra, September, 1995. http:\/\/www.tgc.com\/websec\/20460.html"},{"key":"e_1_3_2_1_12_1","volume-title":"May","author":"Java","year":"1995","unstructured":"Java (tm) Language : A White Paper , May , 1995 . http:\/\/www.javasoft.com\/1.0alpha3\/doc\/overview\/java\/index.html Java (tm) Language: A White Paper, May, 1995. http:\/\/www.javasoft.com\/1.0alpha3\/doc\/overview\/java\/index.html"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the Third International World Wide Web Conference","author":"Kolletzki S.","year":"1995","unstructured":"Kolletzki , S. Privacy Enhanced Mail for WWW , Proceedings of the Third International World Wide Web Conference , April , 1995 . Kolletzki, S. Privacy Enhanced Mail for WWW, Proceedings of the Third International World Wide Web Conference, April, 1995."},{"key":"e_1_3_2_1_14_1","volume-title":"DCE-Web Home Page","author":"Lewontin S.","year":"1995","unstructured":"Lewontin , S. et al . DCE-Web Home Page , September , 1995 . http:\/\/www.osf.org\/www\/dceweb\/index.html Lewontin, S. et al. DCE-Web Home Page, September, 1995. http:\/\/www.osf.org\/www\/dceweb\/index.html"},{"key":"e_1_3_2_1_15_1","unstructured":"Magliery T. The Definitive CCI Refernce. http:\/\/sdg.ncsa.uiuc.edu\/~mag\/work\/CCI.html http:\/\/www.osf.org\/www\/dceweb\/index.html  Magliery T. The Definitive CCI Refernce. http:\/\/sdg.ncsa.uiuc.edu\/~mag\/work\/CCI.html http:\/\/www.osf.org\/www\/dceweb\/index.html"},{"key":"e_1_3_2_1_16_1","volume-title":"July","author":"Rescorla E.","year":"1995","unstructured":"Rescorla , E. and A. Schiffman . The Secure Hyper-Text Transfer Protocol , July , 1995 . http:\/\/info.internet.isi.edu\/in-drafts\/files\/draft-ietf-wts-shttp-00.txt Rescorla, E. and A. Schiffman. The Secure Hyper-Text Transfer Protocol, July, 1995. http:\/\/info.internet.isi.edu\/in-drafts\/files\/draft-ietf-wts-shttp-00.txt"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/174822"},{"key":"e_1_3_2_1_18_1","volume-title":"April","author":"Thompson D.","year":"1995","unstructured":"Thompson , D. , Common Client Interface Protocol Specification , April , 1995 . http:\/\/yahoo.ncsa.uiuc.edu\/mosaic\/cci.spec Thompson, D., Common Client Interface Protocol Specification, April, 1995. http:\/\/yahoo.ncsa.uiuc.edu\/mosaic\/cci.spec"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/202735"}],"event":{"name":"WWW4: Fourth International Conference on World Wide Web","sponsor":["IW3C2","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Boston Massachusetts USA","acronym":"WWW4"},"container-title":["Proceedings of the Fourth International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592626.3592657","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3592626.3592657","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:57Z","timestamp":1750183737000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3592626.3592657"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,12,11]]},"references-count":19,"alternative-id":["10.1145\/3592626.3592657","10.1145\/3592626"],"URL":"https:\/\/doi.org\/10.1145\/3592626.3592657","relation":{},"subject":[],"published":{"date-parts":[[1995,12,11]]},"assertion":[{"value":"2023-08-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}