{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:15:32Z","timestamp":1725549332731},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540283898"},{"type":"electronic","value":"9783540318361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11542322_20","type":"book-chapter","created":{"date-parts":[[2005,9,27]],"date-time":"2005-09-27T12:53:57Z","timestamp":1127825637000},"page":"153-174","source":"Crossref","is-referenced-by-count":19,"title":["Federated Identity-Management Protocols"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]},{"given":"Michael","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/32.481513","volume":"22\/1","author":"M. Abadi","year":"1996","unstructured":"Abadi, M., Needham, R.: Prudent Engineering Practice for Cryptographic Protocols. IEEE Transactions on Software Engineering\u00a022\/1, 6\u201315 (1996)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"20_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1007\/3-540-44750-4_19","volume-title":"Advances in Cryptology - CRYPTO \u201995","author":"R. Anderson","year":"1995","unstructured":"Anderson, R., Needham, R.: Robustness principles for public key protocols. In: Coppersmith, D. (ed.) CRYPTO 1995. LNCS, vol.\u00a0963, pp. 236\u2013247. Springer, Heidelberg (1995)"},{"unstructured":"Bohrer, K., Liu, X., Kesdogan, D., Schonberg, E., Singh, M., Spraragen, S.: Personal Information Management and Distribution. In: 4th Intern. Conf. on Electronic Commerce Research (ICECR-4), Dallas (2001)","key":"20_CR3"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28\/10","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without Identification: Transaction Systems to make Big Brother Obsolete. Communications of the ACM\u00a028\/10, 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System. In: 9th ACM Conference on Computer and Communications Security (CCS), pp. 21\u201330 (2002)","key":"20_CR5","DOI":"10.1145\/586110.586114"},{"key":"20_CR6","volume-title":"19th Annual Computer Security Applications Conference (ACSAC 2003)","author":"T. Gro\u00df","year":"2003","unstructured":"Gro\u00df, T.: Security Analysis of the SAML Single Sign-on Browser\/Artifact Profile. In: 19th Annual Computer Security Applications Conference (ACSAC 2003). IEEE Computer Society Press, Los Alamitos (2003)"},{"unstructured":"IBM Consumer Wallet; White Paper, 1999 (first release 1997), http:\/\/www-3.ibm.com\/software\/webservers\/commerce\/payment\/wallet.pdf","key":"20_CR7"},{"unstructured":"IBM: Enterprise Security Architecture using IBM Tivoli Security Solutions (April 2002), http:\/\/www.redbooks.ibm.com\/abstracts\/sg246014.html","key":"20_CR8"},{"key":"20_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1389-1286(00)00048-7","volume":"33","author":"D.P. Kormann","year":"2000","unstructured":"Kormann, D.P., Rubin, A.D.: Risks of the Passport Single Signon Protocol. Computer Networks\u00a033, 51\u201358 (2000)","journal-title":"Computer Networks"},{"unstructured":"Liberty Alliance Project: Liberty Phase 2 Final Specifications (November 2003), http:\/\/www.projectliberty.org\/specs\/lap-phase2-final.zip (v1.0 July 2002)","key":"20_CR10"},{"unstructured":"Microsoft Corporation: .NET Passport documentation, in particular Technical Overview, September 2001 and SDK 2.1 Documentation (started 1999), http:\/\/www.passport.com and, http:\/\/msdn.microsoft.com\/downloads","key":"20_CR11"},{"unstructured":"Passlogix: v-Go Single Signon; White Paper (2000), http:\/\/www.passlogix.com\/media\/pdfs\/usable_security.pdf (first release 1999)","key":"20_CR12"},{"doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: BBAE \u2013 A General Protocol for Browser-based Attribute Exchange; IBM Research Report RZ 3455 (#93800) 09\/09\/02, http:\/\/www.zurich.ibm.com\/security\/publications\/2002\/","key":"20_CR13","DOI":"10.1145\/644527.644533"},{"key":"20_CR14","first-page":"52","volume-title":"ACM Workshop on Privacy in the Electronic Society (WPES) 2002","author":"B. Pfitzmann","year":"2003","unstructured":"Pfitzmann, B., Waidner, M.: Privacy in Browser-Based Attribute Exchange. In: ACM Workshop on Privacy in the Electronic Society (WPES) 2002, pp. 52\u201362. ACM Press, New York (2003)"},{"issue":"6","key":"20_CR15","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIC.2003.1250582","volume":"7","author":"B. Pfitzmann","year":"2003","unstructured":"Pfitzmann, B., Waidner, M.: Analysis of Liberty Single-Signon with Enabled Clients. IEEE Internet Computing\u00a07(6), 38\u201344 (2003)","journal-title":"IEEE Internet Computing"},{"unstructured":"Roboform: Free Web Form Filler and Password Manager (first release 1999), http:\/\/www.siber.com\/roboform\/","key":"20_CR16"},{"unstructured":"Security Assertion Markup Language (SAML). OASIS Standard (November 2002), http:\/\/www.oasis-open.org\/committees\/security\/docs\/","key":"20_CR17"},{"unstructured":"Shibboleth-Architecture Draft v05 (May 2002), http:\/\/middleware.internet2.edu\/shibboleth\/docs\/draft-internet2-shibboleth-arch-v05.pdf (v01 in 2001)","key":"20_CR18"},{"unstructured":"Slemko, M.: Microsoft Passport to Trouble. Rev. 1.18 (November 2001), http:\/\/alive.znep.com\/~marcs\/passport\/","key":"20_CR19"},{"unstructured":"BEA, IBM, Microsoft, RSA Security, VeriSign: WS-Federation: Passive Requestor Profile. Draft, Version 1.0 (July 2003), http:\/\/www-106.ibm.com\/developerworks\/webservices\/","key":"20_CR20"},{"unstructured":"HTTP Over TLS; Internet RFC 2818 (2000)","key":"20_CR21"},{"unstructured":"XML-Signature Syntax and Processing; W3C Recommendation (February 2002), http:\/\/www.w3.org\/TR\/xmldsig-core\/","key":"20_CR22"},{"unstructured":"Zeroknowledge: Freedom Personal Firewall (first release 1999), http:\/\/www.freedom.net\/products\/firewall\/index.html","key":"20_CR23"}],"container-title":["Lecture Notes in Computer Science","Security Protocols"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11542322_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:18:18Z","timestamp":1605644298000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11542322_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540283898","9783540318361"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/11542322_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}