{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T22:19:24Z","timestamp":1648765164000},"reference-count":27,"publisher":"American Institute of Aeronautics and Astronautics (AIAA)","issue":"8","content-domain":{"domain":["arc.aiaa.org"],"crossmark-restriction":true},"short-container-title":["Journal of Aerospace Information Systems"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.2514\/1.i010425","type":"journal-article","created":{"date-parts":[[2016,11,4]],"date-time":"2016-11-04T11:50:02Z","timestamp":1478260202000},"page":"439-450","update-policy":"http:\/\/dx.doi.org\/10.2514\/aiaa_crossmarkpolicy","source":"Crossref","is-referenced-by-count":0,"title":["Architecting Information Security Services for Federated Satellite Systems"],"prefix":"10.2514","volume":"14","author":[{"given":"Marc","family":"Sanchez Net","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts 02139"}]},{"given":"I\u00f1igo","family":"del Portillo","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts 02139"}]},{"given":"Bruce","family":"Cameron","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts 02139"}]},{"given":"Edward F.","family":"Crawley","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, Massachusetts 02139"}]}],"member":"1387","reference":[{"key":"r1","unstructured":"GolkarA. \u201cFederated Satellite Systems: A Case Study on Sustainability Enhancement of Space Exploration Systems Architectures,\u201d International Astronautical Federation Paper\u00a0IAC-13-D3,4,9x20292, Paris, France, 2013."},{"key":"r2","unstructured":"GolkarA. \u201cDesign Margin Utilization in Commercial Satellite Cloud Computing Systems,\u201d International Astronautical Federation Paper\u00a0IAC-14,03,2,11, x26613, Paris, France, 2014."},{"key":"r4","doi-asserted-by":"publisher","DOI":"10.1016\/j.actaastro.2015.02.009"},{"key":"r5","doi-asserted-by":"crossref","unstructured":"SymingtonS.FarrellS.WeissH.LovellP. \u201cBundle Security Protocol Specification,\u201d Internet Engineering Task Force, Fremont CA, 2011.","DOI":"10.17487\/rfc6257"},{"key":"r6","unstructured":"\u201cSpace Data Link Security Protocol,\u201d Consultative Committee for Space Data Systems, NASA TR, Washington, D.C., Feb.\u00a02012."},{"key":"r7","unstructured":"\u201cSecurity Architecture for Space Data Systems,\u201d Consultative Committee for Space Data Systems, NASA TR, Washington, D.C., Nov.\u00a02012."},{"key":"r12","doi-asserted-by":"publisher","DOI":"10.1145\/1044552.1044560"},{"key":"r13","doi-asserted-by":"publisher","DOI":"10.1002\/9781118027974"},{"key":"r15","doi-asserted-by":"publisher","DOI":"10.15837\/ijccc.2008.4.2402"},{"key":"r16","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2003.819978"},{"key":"r18","doi-asserted-by":"crossref","unstructured":"WallnerD.HarderE.AgeeR. \u201cKey Management for Multicast: Issues and Architectures,\u201d TR\u00a0RFC 2627, 1999.","DOI":"10.17487\/rfc2627"},{"key":"r19","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1505-1"},{"key":"r21","unstructured":"\u201cSpace Missions Key Management Concept,\u201d Consultative Committee for Space Data Systems, NASA, Washington, D.C., 2011."},{"key":"r22","unstructured":"FarrellS.SymingtonS.WeissH.LovellP. \u201cDelay-Tolerant Networking Security Overview,\u201d Internet Research Task Force, Fremont CA, 2009."},{"key":"r23","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2008.05.003"},{"key":"r24","volume-title":"CISSP Guide to Security Essentials","author":"Gregory P.","year":"2009","edition":"2"},{"key":"r25","doi-asserted-by":"crossref","unstructured":"ShireyR. W. \u201cInternet Security Glossary,\u201d Internet Engineering Task Force, Fremont CA, 2000.","DOI":"10.17487\/rfc2828"},{"key":"r26","unstructured":"\u201cDenial of Service Attacks,\u201d Software Engineering Inst., CERT Coordination Center TR, 2001."},{"key":"r27","doi-asserted-by":"crossref","unstructured":"\u201cTCP SYN Flooding and IP Spoofing Attacks,\u201d Software Engineering Inst., CERT Coordination Center CERT Advisory\u00a0CA-1996-21, Pittsburgh, PA, 1996.","DOI":"10.1016\/S1353-4858(96)90059-8"},{"key":"r29","doi-asserted-by":"publisher","DOI":"10.1145\/944217.944241"},{"key":"r30","unstructured":"\u201cPublic Key Encryption and Digital Signature: How Do They Work?\u201d CGI Group Inc., Montreal, QC, 2004."},{"key":"r31","unstructured":"JoK. Y., Satellite Communications Network Design and Analysis, Artech House, London, 2011, pp.\u00a0423\u2013452."},{"key":"r32","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2007.09.005"},{"key":"r33","doi-asserted-by":"publisher","DOI":"10.1145\/359460.359473"},{"key":"r34","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"r36","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"r37","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"}],"container-title":["Journal of Aerospace Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/arc.aiaa.org\/doi\/pdf\/10.2514\/1.I010425","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,1]],"date-time":"2021-03-01T07:42:45Z","timestamp":1614584565000},"score":1,"resource":{"primary":{"URL":"https:\/\/arc.aiaa.org\/doi\/10.2514\/1.I010425"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8]]},"references-count":27,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["10.2514\/1.I010425"],"URL":"https:\/\/doi.org\/10.2514\/1.i010425","relation":{},"ISSN":["2327-3097"],"issn-type":[{"value":"2327-3097","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8]]},"assertion":[{"value":"2015-09-30","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-12","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-09-27","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-11-04","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}