{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T15:46:12Z","timestamp":1769010372692,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540377436","type":"print"},{"value":"9783540377450","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11823865_14","type":"book-chapter","created":{"date-parts":[[2006,9,18]],"date-time":"2006-09-18T15:16:52Z","timestamp":1158592612000},"page":"132-141","source":"Crossref","is-referenced-by-count":17,"title":["Attribute-Based Authentication and Authorisation Infrastructures for E-Commerce Providers"],"prefix":"10.1007","author":[{"given":"Christian","family":"Schl\u00e4ger","sequence":"first","affiliation":[]},{"given":"Manuel","family":"Sojer","sequence":"additional","affiliation":[]},{"given":"Bj\u00f6rn","family":"Muschall","sequence":"additional","affiliation":[]},{"given":"G\u00fcnther","family":"Pernul","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-24689-3_5","volume-title":"Grid Computing","author":"R. Alfieri","year":"2004","unstructured":"Alfieri, R., Cecchini, R., Ciaschini, V., dell\u2019Agnello, L., Frohner, \u00c1., Gianoli, A., L\u00f6rentey, K., Spataro, F.: VOMS, an Authorization System for Virtual Organizations. In: Fern\u00e1ndez Rivera, F., Bubak, M., G\u00f3mez Tato, A., Doallo, R. (eds.) Across Grids 2003. LNCS, vol.\u00a02970, pp. 33\u201340. Springer, Heidelberg (2004)"},{"key":"14_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1007\/11805588_19","volume-title":"Data and Applications Security XX","author":"S. Busch","year":"2006","unstructured":"Busch, S., Muschall, B., Pernul, G., Priebe, T.: Authrule: A Generic Rule-Based Authorization Module. In: Damiani, E., Liu, P. (eds.) Data and Applications Security 2006. LNCS, vol.\u00a04127, pp. 267\u2013281. Springer, Heidelberg (2006)"},{"key":"14_CR3","unstructured":"Cantor, S., Kemp, J.: Liberty ID-FF Protocols and Schema Specification (2003), http:\/\/www.projectliberty.org\/specs\/liberty-idff-protocols-schema-v1.2.pdf"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Cantor, S.: Shibboleth Architecture, Protocols and Profiles, Working Draft 05, November 23 (2004), http:\/\/shibboleth.internet2.edu\/docs\/draft-mace-shibboleth-arch-protocols-05.pdf","DOI":"10.26869\/TI.66.1"},{"issue":"6","key":"14_CR5","doi-asserted-by":"publisher","first-page":"703","DOI":"10.1016\/S1389-1286(01)00247-X","volume":"37","author":"R. Castro-Rojo","year":"2001","unstructured":"Castro-Rojo, R., Lopez, D.R.: The PAPI system: point of access to providers of information. Computer Networks\u00a037(6), 703\u2013710 (2001)","journal-title":"Computer Networks"},{"issue":"2","key":"14_CR6","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0167-739X(02)00153-X","volume":"19","author":"D.W. Chadwick","year":"2003","unstructured":"Chadwick, D.W., Otenko, A.: The PERMIS X.509 role based privilege management infrastructure. Future Generation Comp. Syst.\u00a019(2), 277\u2013289 (2003)","journal-title":"Future Generation Comp. Syst."},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/11573036_52","volume-title":"Advances in Informatics","author":"S.K. Katsikas","year":"2005","unstructured":"Katsikas, S.K., Lopez, J., Pernul, G.: Trust, Privacy and Security in E-business: Requirements and Solutions. In: Bozanis, P., Houstis, E.N. (eds.) PCI 2005. LNCS, vol.\u00a03746, pp. 548\u2013558. Springer, Heidelberg (2005)"},{"key":"14_CR8","unstructured":"Lepro, R.: Cardea: Dynamic Access Control in Distributed Systems. NAS Technical Report NAS-03-020, 1-13 (2003)"},{"issue":"7","key":"14_CR9","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.cose.2004.06.013","volume":"23","author":"J. Lopez","year":"2004","unstructured":"Lopez, J., Oppliger, R., Pernul, G.: Authentication and Authorization Infrastructures (AAIs): A Comparative Survey. Computers & Security\u00a023(7), 578\u2013590 (2004)","journal-title":"Computers & Security"},{"key":"14_CR10","unstructured":"Microsoft: Microsoft.NET Passport Review Guide (2003), www.microsoft.com\/net\/services\/passport\/review_guide.asp"},{"key":"14_CR11","unstructured":"OASIS Security Services Technical Committee: Security Assertion Markup Language (SAML) (2005), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security"},{"key":"14_CR12","unstructured":"OASIS eXtensible Access Control Markup Language Technical Committee: eXtensible Access Control Markup Language (XACML) (2005), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"14_CR13","unstructured":"Pearlman, L., Kesselman, C., Welch, V., Foster, I., Tuecke, S.: The Community Authorization Service: Status and Future. In: 2003 Conference for Computing in High Energy and Nuclear Physics (2003)"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Priebe, T., Dobmeier, W., Kamprath, N.: Supporting Attribute-based Access Control with Ontologies. In: 1st International Conference on Availability, Reliability and Security (2006)","DOI":"10.1109\/ARES.2006.127"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/11545163_31","volume-title":"E-Commerce and Web Technologies","author":"C. Schlaeger","year":"2005","unstructured":"Schlaeger, C., Pernul, G.: Authentication and Authorisation Infrastructures in b2c e-commerce. In: Bauknecht, K., Pr\u00f6ll, B., Werthner, H. (eds.) EC-Web 2005. LNCS, vol.\u00a03590, pp. 306\u2013315. Springer, Heidelberg (2005)"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/11824633_5","volume-title":"Trust and Privacy in Digital Business","author":"C. Schl\u00e4ger","year":"2006","unstructured":"Schl\u00e4ger, C., Nowey, T.: Towards a Risk Management Perspective on AAIs. In: Fischer-H\u00fcbner, S., Furnell, S., Lambrinoudakis, C. (eds.) TrustBus 2006. LNCS, vol.\u00a04083, pp. 41\u201350. Springer, Heidelberg (2006)"},{"issue":"4","key":"14_CR17","doi-asserted-by":"publisher","first-page":"566","DOI":"10.1145\/950191.950196","volume":"6","author":"M. Thompson","year":"2003","unstructured":"Thompson, M., Essiari, A., Mudumbai, S.: Certificate-based Authorization Policy in a PKI Environment. ACM Transactions on Information and System Security\u00a06(4), 566\u2013588 (2003)","journal-title":"ACM Transactions on Information and System Security"},{"key":"14_CR18","unstructured":"Welch, V., Barton, T., Keahey, K., Siebenlist, F.: Attributes, Anonymity, and Access: Shibboleth and Globus Integration to Facilitate Grid Collaboration. In: 4th Annual PKI R&D Workshop (2005)"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J.: Attribute Based Access Control (ABAC) for Web Services. In: International Conference on Web Services 2005, pp. 561\u2013569 (2005)","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes in Computer Science","E-Commerce and Web Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11823865_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T20:17:24Z","timestamp":1605644244000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11823865_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540377436","9783540377450"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/11823865_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}