{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:52:03Z","timestamp":1725475923826},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540482697"},{"type":"electronic","value":"9783540482727"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11915034_86","type":"book-chapter","created":{"date-parts":[[2006,11,29]],"date-time":"2006-11-29T23:40:30Z","timestamp":1164843630000},"page":"626-635","source":"Crossref","is-referenced-by-count":2,"title":["Securing Data Accountability in Decentralized Systems"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Corin","sequence":"first","affiliation":[]},{"given":"David","family":"Galindo","sequence":"additional","affiliation":[]},{"given":"Jaap-Henk","family":"Hoepman","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"86_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/3-540-47719-5_29","volume-title":"Information Security and Privacy","author":"A. Ansper","year":"2001","unstructured":"Ansper, A., Buldas, A., Saarepera, M., Willemson, J.: Improving the availability of time-stamping services. In: Varadharajan, V., Mu, Y. (eds.) ACISP 2001. LNCS, vol.\u00a02119, pp. 360\u2013375. Springer, Heidelberg (2001)"},{"key":"86_CR2","unstructured":"http:\/\/www.authentidate.com\/"},{"key":"86_CR3","doi-asserted-by":"crossref","unstructured":"Bertino, E., Catania, B., Ferrari, E., Perlasca, P.: A logical framework for reasoning about access control models. In: ACM Transactions on Information and System Security (TISSEC), pp. 71\u2013127 (2003)","DOI":"10.1145\/605434.605437"},{"key":"86_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"359","DOI":"10.1007\/11556992_26","volume-title":"Information Security","author":"A. Buldas","year":"2005","unstructured":"Buldas, A., Laud, P., Saarepera, M., Willemson, J.: Universally composable time-stamping schemes with audit. In: Zhou, J., L\u00f3pez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol.\u00a03650, pp. 359\u2013373. Springer, Heidelberg (2005)"},{"key":"86_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/POLICY.2005.5","volume-title":"6th Int. Workshop on Policies for Distributed Systems & Networks (POLICY)","author":"J.G. Cederquist","year":"2005","unstructured":"Cederquist, J.G., Corin, R.J., Dekker, M.A.C., Etalle, S., den Hartog, J.I.: An audit logic for accountability. In: 6th Int. Workshop on Policies for Distributed Systems & Networks (POLICY), pp. 34\u201343. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"86_CR6","first-page":"187","volume-title":"Proc. of the 2nd IFIP Workshop on Formal Aspects in Security and Trust (FAST)","author":"R. Corin","year":"2004","unstructured":"Corin, R., Etalle, S., den Hartog, J.I., Lenzini, G., Staicu, I.: A logic for auditing accountability in decentralized systems. In: Proc. of the 2nd IFIP Workshop on Formal Aspects in Security and Trust (FAST), vol.\u00a0173, pp. 187\u2013202. Springer, Heidelberg (2004)"},{"key":"86_CR7","doi-asserted-by":"crossref","unstructured":"Corin, R., Etalle, S., Saptawijaya, A.: A logic for constraint-based security protocol analysis. In: IEEE Symposium on Security and Privacy (2006)","DOI":"10.1109\/SP.2006.3"},{"key":"86_CR8","unstructured":"http:\/\/www.digistamp.com\/"},{"issue":"2","key":"86_CR9","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"2","key":"86_CR10","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S. Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput.\u00a017(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"86_CR11","unstructured":"ISO IEC 18014-3, time-stamping services \u2013 part 3: Mechanisms producing linked tokens"},{"key":"86_CR12","doi-asserted-by":"publisher","first-page":"474","DOI":"10.1145\/253260.253364","volume-title":"SIGMOD 1997","author":"S. Jajodia","year":"1997","unstructured":"Jajodia, S., Samarati, P., Subrahmanian, V.S., Bertino, E.: A unified framework for enforcing multiple access control policies. In: Peckham, J. (ed.) SIGMOD 1997. Proc. International Conference on Management of Data, pp. 474\u2013485. ACM Press, New York (1997)"},{"key":"86_CR13","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/507711.507722","volume-title":"Proc. of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT)","author":"J. Park","year":"2002","unstructured":"Park, J., Sandhu, R.: Towards usage control models: Beyond traditional access control. In: Bertino, E. (ed.) Proc. of the 7th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 57\u201364. ACM Press, New York (2002)"},{"issue":"9","key":"86_CR14","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/35.312842","volume":"32","author":"R. Sandhu","year":"1994","unstructured":"Sandhu, R., Samarati, P.: Access control: Principles and practice. IEEE Communications Magazine\u00a032(9), 40\u201348 (1994)","journal-title":"IEEE Communications Magazine"},{"key":"86_CR15","unstructured":"http:\/\/www.surety.com\/"}],"container-title":["Lecture Notes in Computer Science","On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11915034_86.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:41:17Z","timestamp":1619509277000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11915034_86"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540482697","9783540482727"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11915034_86","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}