{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:05:41Z","timestamp":1725797141449},"publisher-location":"Boston, MA","reference-count":25,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781475780161"},{"type":"electronic","value":"9781402081439"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/1-4020-8143-x_34","type":"book-chapter","created":{"date-parts":[[2005,12,23]],"date-time":"2005-12-23T16:39:43Z","timestamp":1135355983000},"page":"517-532","source":"Crossref","is-referenced-by-count":0,"title":["Security and Differentiated Hotspot Services Through Policy-Based Management Architecture"],"prefix":"10.1007","author":[{"given":"Idir","family":"Fodil","sequence":"first","affiliation":[]},{"given":"Vincent","family":"Jardin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"34_CR1","unstructured":"References"},{"key":"34_CR2","unstructured":"IEEE. 802.11b\/d3.0 Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specification, August 1999."},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Junbiao Zhang and al, \u201cVirtual Operator based AAA in Wireless LAN Hot Spots with Ad-hoc Networking Support\u201d, Mobile Computing and Communications Review, Volume 6, Number 3.","DOI":"10.1145\/581291.581297"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/769800.769825","volume":"46","author":"T Schmidt","year":"2003","unstructured":"TerrySchmidt andAnthonyTownsend, \u201cWhy WI-FI Wants to be free\u201d, Communications of the ACM, Vol. 46, N\u00b0 5, May 2003.","journal-title":"Communications of the ACM"},{"key":"34_CR5","doi-asserted-by":"publisher","DOI":"10.1145\/588646.588709","volume-title":"Authenticating Public Access networking","author":"J Graham II","year":"2002","unstructured":"Joseph W.Graham II, \u201cAuthenticating Public Access networking\u201d, SIGUCCS\u201902, November 20\u201323, 2002, Providence, Rhode Island, USA."},{"key":"34_CR6","volume-title":"Communications of the ACM, Vol. 43, N\u00b0. 6","author":"U Varshney","year":"2000","unstructured":"Upkar Varshney and Ron Vetter, \u201cEmerging Mobile and Wireless Networks\u201d, Communications of the ACM, Vol. 43, N\u00b0. 6, June 2000."},{"key":"34_CR7","volume-title":"Communications of the ACM, Vol. 45, N\u00b0. 10","author":"R Malladi","year":"2002","unstructured":"Rajeswari Malladi and Dharma P. Agrawal, \u201cCurrent and Future Applications of Mobile and Wireless Networks\u201d, Communications of the ACM, Vol. 45, N\u00b0. 10, October 2002."},{"key":"34_CR8","unstructured":"IEEE Daft P802.1X\/D11: Standard for Port based Network Access Control, LAN MAN Standards Committee of the IEEE Computer Society, March 27,2001."},{"key":"34_CR9","volume-title":"Authorization and charging in public WLANs using Free BSD and 802","author":"P Nikander","year":"2002","unstructured":"Pekka Nikander, \u201cAuthorization and charging in public WLANs using Free BSD and 802\u201d. Ix, USENIX annual technical conference, June 10\u20131 2002."},{"key":"34_CR10","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2002.1019332","volume-title":"On Service Level Agreements for IP Networks","author":"J Martin","year":"2002","unstructured":"Jim Martin, and Arne Nilson, \u201cOn Service Level Agreements for IP Networks\u201d, IEEE Infocom Conference, June 2002."},{"key":"34_CR11","volume-title":"Definition and usage of SLS in the AQUILA Consortium","author":"S Salsano","year":"2000","unstructured":"S. Salsano et al., \u201cDefinition and usage of SLS in the AQUILA Consortium\u201d, Internet Draft, November 2000."},{"key":"34_CR12","volume-title":"RFC 3060: Policy Core Information Model \u2014 version 1 Specification","author":"B Moore","year":"2001","unstructured":"Bob Moore, Ed Ellesson, John Strassner, and Andrea Westerinen, \u201cRFC 3060: Policy Core Information Model \u2014 version 1 Specification\u201d. IETF, February 2001."},{"key":"34_CR13","volume-title":"IPsec Configuration Policy Model","author":"J Jason","year":"2001","unstructured":"J Jason, L Rafalow, and E Vyncke, \u201cIPsec Configuration Policy Model\u201d, Internet draft, November 2001."},{"key":"34_CR14","volume-title":"Policy QoS Information Model","author":"Y Snir","year":"2001","unstructured":"Y Snir, Y Ramberg, J Strassner, R Cohen, and B Moore, \u201cPolicy QoS Information Model\u201d, Internet draft, November 2001."},{"key":"34_CR15","volume-title":"RFC 2753: A Framework for Policy-Based Admission Control","author":"R Yvatkar","year":"2000","unstructured":"Raj Yvatkar, Dimitrios Pendarakis, and Rocj Guerin, \u201cRFC 2753: A Framework for Policy-Based Admission Control\u201d. IETF, Informational, January 2000."},{"key":"34_CR16","volume-title":"RFC 3198: Terminology for Policy Based Management","author":"A Westrinen","year":"2001","unstructured":"A. Westrinen and al, \u201cRFC 3198: Terminology for Policy Based Management\u201d, IETF, November 2001."},{"key":"34_CR17","volume-title":"Understanding Policy-Based Networking","author":"D Kosiur","year":"2001","unstructured":"David Kosiur, \u201cUnderstanding Policy-Based Networking\u201d. Wiley Computer Publishing, 2001."},{"key":"34_CR18","volume-title":"RFC 2284: PPP Extensible Authentication Protocol (EAP)","author":"L Blunk","year":"1998","unstructured":"L. Blunk and J. Vollbrecht, \u201cRFC 2284: PPP Extensible Authentication Protocol (EAP)\u201d. IETF, March 1998."},{"key":"34_CR19","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2865","volume-title":"RFC 2865: Remote Authentic ation Dial in User Service (Radius)","author":"C Rigney","year":"2000","unstructured":"C. Rigney, S. Willens, A. Rubens, and W. Simpson, \u201cRFC 2865: Remote Authentic ation Dial in User Service (Radius)\u201d, IETF, June 2000."},{"key":"34_CR20","volume-title":"Protocol for Carrying Authentication for Network Access (PANA) Requirements","author":"A Yegin","year":"2003","unstructured":"Alper E. Yegin, Yoshihiro Ohba, Reinaldo Penno, George Tsirtsis and Cliff Wang, \u201cProtocol for Carrying Authentication for Network Access (PANA) Requirements\u201d, Internet Draft , June 2003."},{"key":"34_CR21","volume-title":"Light Weight Access Point Protocol","author":"P Kalhoun","year":"2003","unstructured":"P. Kalhoun and al., \u201cLight Weight Access Point Protocol\u201d, Internet Draft, June 2003."},{"key":"34_CR22","volume-title":"RFC 2401: Security Architecture for the Internet Protocol","author":"S Kent","year":"1998","unstructured":"S. Kent, and R. Atkinson, \u201cRFC 2401: Security Architecture for the Internet Protocol\u201d,IETF, November 1998."},{"key":"34_CR23","unstructured":"INFRADIO Project: http:\/\/rp.ljp6.fr \/infradio\/"},{"key":"34_CR24","volume-title":"Want Wi-Fi? Verizon takes it home","author":"B Charny","year":"2002","unstructured":"Charny, B. (2002c). Want Wi-Fi? Verizon takes it home. CNETNews.com, October 9."},{"key":"34_CR25","volume-title":"The Evolving Hot Spot Market for Broadband Access","author":"A Mahler","year":"2003","unstructured":"A. Mahler and C. Steinfield The Evolving Hot Spot Market for Broadband Access \u201cITU Telecom World 2003 Forum panel on Technologies for Broadband, Geneva, October 2003\u201d"}],"container-title":["Security and Protection in Information Processing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8143-X_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T20:12:01Z","timestamp":1586635921000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8143-X_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9781475780161","9781402081439"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8143-x_34","relation":{},"subject":[],"published":{"date-parts":[[2004]]}}}