{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,31]],"date-time":"2024-08-31T05:08:03Z","timestamp":1725080883697},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2000,1,5]]},"DOI":"10.1145\/325694.325736","type":"proceedings-article","created":{"date-parts":[[2003,6,2]],"date-time":"2003-06-02T17:12:42Z","timestamp":1054573962000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Generalized certificate revocation"],"prefix":"10.1145","author":[{"given":"Carl A.","family":"Gunter","sequence":"first","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Trevor","family":"Jim","sequence":"additional","affiliation":[{"name":"AT&T Research"}]}],"member":"320","published-online":{"date-parts":[[2000,1,5]]},"reference":[{"key":"e_1_3_2_1_1_2","first-page":"137","volume-title":"Advances in Cryptology: CRYPTO '98, number 1462 in Lecture Notes in Computer Science","author":"Sachin Lodha~ William Aiello~","year":"1998","unstructured":"William Aiello~ Sachin Lodha~ and l ~afail Ostrovsky . Fast digital identity revocation . In Advances in Cryptology: CRYPTO '98, number 1462 in Lecture Notes in Computer Science , pages 137 - 152 . Springer-Verlag , 1998 .]] William Aiello~ Sachin Lodha~ and l~afail Ostrovsky. Fast digital identity revocation. In Advances in Cryptology: CRYPTO '98, number 1462 in Lecture Notes in Computer Science, pages 137-152. Springer-Verlag, 1998.]]"},{"key":"e_1_3_2_1_2_2","doi-asserted-by":"publisher","DOI":"10.5555\/525080.884248"},{"key":"e_1_3_2_1_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/181550.181564"},{"key":"e_1_3_2_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(95)00024-Q"},{"key":"e_1_3_2_1_5_2","doi-asserted-by":"publisher","DOI":"10.1145\/77648.77649"},{"key":"e_1_3_2_1_6_2","volume-title":"Internet Draft","author":"Ellison Carl M.","year":"1998","unstructured":"Carl M. Ellison , Bill Frantz , Butler Lampson , Ron Rivest , Brian M. Thomas , and Tatu Ylonen . SPKI certificate theory . Internet Draft , March 1998 .]] Carl M. Ellison, Bill Frantz, Butler Lampson, Ron Rivest, Brian M. Thomas, and Tatu Ylonen. SPKI certificate theory. Internet Draft, March 1998.]]"},{"key":"e_1_3_2_1_7_2","volume-title":"Internet Draft","author":"Ellison Carl M.","year":"1998","unstructured":"Carl M. Ellison , Bill Frantz , Butler Lampson , P~on Rivest , Brian M. Thomas , and Tatu Ylonen . SPKI examples . Internet Draft , March 1998 .]] Carl M. Ellison, Bill Frantz, Butler Lampson, P~on Rivest, Brian M. Thomas, and Tatu Ylonen. SPKI examples. Internet Draft, March 1998.]]"},{"key":"e_1_3_2_1_8_2","volume-title":"Secure Electronic Commerce","author":"Ford Warwick","year":"1999","unstructured":"Warwick Ford and Michael S. Bantu . Secure Electronic Commerce . Prentice Hall , 1999 .]] Warwick Ford and Michael S. Bantu. Secure Electronic Commerce. Prentice Hall, 1999.]]"},{"key":"e_1_3_2_1_9_2","first-page":"158","volume-title":"Hirschfeld {12}","author":"Fox Barbara","unstructured":"Barbara Fox and Brian LaMacchia . Certificate revocation: Mechanics and meaning . In Hirschfeld {12} , pages 158 - 164 .]] Barbara Fox and Brian LaMacchia. Certificate revocation: Mechanics and meaning. In Hirschfeld {12}, pages 158-164.]]"},{"key":"e_1_3_2_1_10_2","doi-asserted-by":"publisher","DOI":"10.5555\/647503"},{"key":"e_1_3_2_1_11_2","volume-title":"July","author":"Carl","year":"1998","unstructured":"Carl A. Gunter and Trevor Jim. Policy directed certificate retrieval , July 1998 . www.cis.upenn.edu\/-qcm\/ papers\/qcm-ab stract, html.]] Carl A. Gunter and Trevor Jim. Policy directed certificate retrieval, July 1998. www.cis.upenn.edu\/-qcm\/ papers\/qcm-ab stract, html.]]"},{"key":"e_1_3_2_1_12_2","doi-asserted-by":"publisher","DOI":"10.5555\/647502"},{"key":"e_1_3_2_1_13_2","volume-title":"J~nuary","author":"Housley R.","year":"1999","unstructured":"R. Housley , W. Ford , W. Polk , and D. Solo . Internet X.509 Public Key Infrastructure: Certificate and CRL Profile. IETF RFC 2459 , J~nuary 1999 .]] R. Housley, W. Ford, W. Polk, and D. Solo. Internet X.509 Public Key Infrastructure: Certificate and CRL Profile. IETF RFC 2459, J~nuary 1999.]]"},{"key":"e_1_3_2_1_14_2","volume-title":"Information technology~Open Systems Interconnection--The Directory: Overview of concepts, models and services","author":"IEC","year":"1997","unstructured":"ISO\/ IEC 9594-1. Information technology~Open Systems Interconnection--The Directory: Overview of concepts, models and services , 1997 . Equivalent to ITU-T Rec. X. 500, 1997.]] ISO\/IEC 9594-1. Information technology~Open Systems Interconnection--The Directory: Overview of concepts, models and services, 1997. Equivalent to ITU-T Rec. X.500, 1997.]]"},{"key":"e_1_3_2_1_15_2","volume-title":"Information technology--Open Systems Interconnection-- The Directory: Authentication framework","author":"IEC","year":"1997","unstructured":"ISO\/ IEC 9794-8. Information technology--Open Systems Interconnection-- The Directory: Authentication framework , 1997 . Equivalent to ITU-T Rec. X. 509, 1997.]] ISO\/IEC 9794-8. Information technology--Open Systems Interconnection-- The Directory: Authentication framework, 1997. Equivalent to ITU-T Rec. X.509, 1997.]]"},{"key":"e_1_3_2_1_16_2","volume-title":"March","author":"Kakkar Pankaj","year":"1999","unstructured":"Pankaj Kakkar , Michael McDougall , Carl A. Gunter , and Trevor Jim . Credential distribution with local autonomy, www. cis.upenn, edu\/-qcm\/papers\/ autonomy-abstracZ.html , March 1999 .]] Pankaj Kakkar, Michael McDougall, Carl A. Gunter, and Trevor Jim. Credential distribution with local autonomy, www. cis.upenn, edu\/-qcm\/papers\/ autonomy-abstracZ.html, March 1999.]]"},{"key":"e_1_3_2_1_17_2","volume-title":"Privacy Enhancement for Internet Electronic Mail: Part H: Certij~ca~e-Based Key Management. IETF RFC","author":"Kent S.","year":"1993","unstructured":"S. Kent . Privacy Enhancement for Internet Electronic Mail: Part H: Certij~ca~e-Based Key Management. IETF RFC 1422, February 1993 .]] S. Kent. Privacy Enhancement for Internet Electronic Mail: Part H: Certij~ca~e-Based Key Management. IETF RFC 1422, February 1993.]]"},{"key":"e_1_3_2_1_18_2","first-page":"172","volume-title":"Hirschfeld {12}","author":"Kocher Paul","unstructured":"Paul Kocher . On certificate revocation and validation . In Hirschfeld {12} , pages 172 - 177 .]] Paul Kocher. On certificate revocation and validation. In Hirschfeld {12}, pages 172-177.]]"},{"key":"e_1_3_2_1_19_2","volume-title":"AT&T Labs","author":"McDaniel Patrick","year":"1999","unstructured":"Patrick McDaniel and Aviet D. Rubin . A response to \"Can we eliminate certificate revocation lists?\". Technical l~eport 99.8.1 , AT&T Labs , August 1999 .]] Patrick McDaniel and Aviet D. Rubin. A response to \"Can we eliminate certificate revocation lists?\". Technical l~eport 99.8.1, AT&T Labs, August 1999.]]"},{"key":"e_1_3_2_1_20_2","volume-title":"McDaniel and Sugih Jamin. Windowed key revocation in public key infrastructures","author":"Patrick","year":"1999","unstructured":"Patrick D. McDaniel and Sugih Jamin. Windowed key revocation in public key infrastructures , 1999 .]] Patrick D. McDaniel and Sugih Jamin. Windowed key revocation in public key infrastructures, 1999.]]"},{"key":"e_1_3_2_1_21_2","volume-title":"Efficient certificate revocation. Technical l~eport TM-542","author":"Micali Silvio","year":"1996","unstructured":"Silvio Micali . Efficient certificate revocation. Technical l~eport TM-542 , Massachusetts Institute of Technology , March 1996 .]] Silvio Micali. Efficient certificate revocation. Technical l~eport TM-542, Massachusetts Institute of Technology, March 1996.]]"},{"key":"e_1_3_2_1_22_2","first-page":"196","volume-title":"Proceedings of Computer Security, Dependability, and Assurance: From Needs to Solutions (CSDA '98)","author":"Jonathan","year":"1999","unstructured":"Jonathan K. Millen and Rebecca N. Wright. Certificate revocation the responsible way . In Proceedings of Computer Security, Dependability, and Assurance: From Needs to Solutions (CSDA '98) , pages 196 - 203 . IEEE Computer Society , 1999 .]] Jonathan K. Millen and Rebecca N. Wright. Certificate revocation the responsible way. In Proceedings of Computer Security, Dependability, and Assurance: From Needs to Solutions (CSDA '98), pages 196-203. IEEE Computer Society, 1999.]]"},{"key":"e_1_3_2_1_23_2","first-page":"165","volume-title":"Hirschfeld {12}","author":"Myers Michael","unstructured":"Michael Myers . Revocation: Options and challenges , in Hirschfeld {12} , pages 165 - 171 .]] Michael Myers. Revocation: Options and challenges, in Hirschfeld {12}, pages 165-171.]]"},{"key":"e_1_3_2_1_24_2","doi-asserted-by":"crossref","unstructured":"Michael Myers Rich Ankney Amburish Malpani Slava GMperin and Carlisle Adams. X.509 Intern~t Public Key Infrastructure Online Certificate Status Protocol~ OCSP March 1999.]] Michael Myers Rich Ankney Amburish Malpani Slava GMperin and Carlisle Adams. X.509 Intern~t Public Key Infrastructure Online Certificate Status Protocol~ OCSP March 1999.]]","DOI":"10.17487\/rfc2560"},{"key":"e_1_3_2_1_25_2","volume-title":"7th USENIX Security Symposium","author":"Naor Moni","year":"1998","unstructured":"Moni Naor and Kobbi Nissim . Certificate revocation and certificate update . In 7th USENIX Security Symposium , 1998 .]] Moni Naor and Kobbi Nissim. Certificate revocation and certificate update. In 7th USENIX Security Symposium, 1998.]]"},{"key":"e_1_3_2_1_26_2","first-page":"178","volume-title":"Can we eliminate certificate revocation lists? In Hirschfeld {12}","author":"Rivest ~ld L.","unstructured":"R.on ~ld L. Rivest . Can we eliminate certificate revocation lists? In Hirschfeld {12} , pages 178 - 183 .]] R.on~ld L. Rivest. Can we eliminate certificate revocation lists? In Hirschfeld {12}, pages 178-183.]]"},{"key":"e_1_3_2_1_27_2","volume-title":"Rivest and Butler Lampson. SDSI-- a simple distributed security infrastructure. theory, ics .mit.edu\/'cis\/sdsi .html","author":"Ronald","year":"1996","unstructured":"Ronald L. Rivest and Butler Lampson. SDSI-- a simple distributed security infrastructure. theory, ics .mit.edu\/'cis\/sdsi .html , 1996 .]] Ronald L. Rivest and Butler Lampson. SDSI-- a simple distributed security infrastructure. theory, ics .mit.edu\/'cis\/sdsi .html, 1996.]]"},{"key":"e_1_3_2_1_28_2","doi-asserted-by":"publisher","DOI":"10.5555\/882491.884226"},{"key":"e_1_3_2_1_29_2","doi-asserted-by":"publisher","DOI":"10.1145\/238168.238195"},{"key":"e_1_3_2_1_30_2","volume-title":"IETF","author":"Turner Sean","year":"1999","unstructured":"Sean Turner and Alfred Arsen~ult . Interact X. 509 Public Key Infrastructure: PKIX Roadmap . IETF , 1999 . www. ietf. org\/internet-draft s\/ draft-let f-pkix-ro admap-01, txt.]] Sean Turner and Alfred Arsen~ult. Interact X.509 Public Key Infrastructure: PKIX Roadmap. IETF, 1999. www. ietf. org\/internet-draft s\/ draft-let f-pkix-ro admap-01, txt.]]"},{"key":"e_1_3_2_1_31_2","first-page":"1777","author":"Yeong W.","year":"1995","unstructured":"W. Yeong , T. Howes , and S. Kille . Lightweight Directory Access Protocol. IETF RFC 1777 , 1995 .]] W. Yeong, T. Howes, and S. Kille. Lightweight Directory Access Protocol. IETF RFC 1777, 1995.]]","journal-title":"Lightweight Directory Access Protocol. IETF RFC"}],"event":{"name":"POPL00: Symposium on Principles of Programming Languages 2000","location":"Boston MA USA","acronym":"POPL00","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/325694.325736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T04:16:18Z","timestamp":1673410578000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/325694.325736"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1,5]]},"references-count":31,"alternative-id":["10.1145\/325694.325736","10.1145\/325694"],"URL":"https:\/\/doi.org\/10.1145\/325694.325736","relation":{},"subject":[],"published":{"date-parts":[[2000,1,5]]},"assertion":[{"value":"2000-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}