{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T18:46:35Z","timestamp":1725475595427},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540687900"},{"type":"electronic","value":"9783540687931"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11957454_4","type":"book-chapter","created":{"date-parts":[[2006,12,11]],"date-time":"2006-12-11T09:15:43Z","timestamp":1165828543000},"page":"59-77","source":"Crossref","is-referenced-by-count":19,"title":["Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks"],"prefix":"10.1007","author":[{"given":"Mansour","family":"Alsaleh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Carlisle","family":"Adams","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Aarts, R., Bj\u00f6rksten, M., Deadman, S., Duserick, B., Karhuluoma, N., et al.: Liberty architecture framework for supporting Privacy Preference Expression Languages (PPELs). Version 1.0, Liberty Alliance Project (November 2003), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/about\/whitepapers.php"},{"key":"4_CR2","volume-title":"Proceedings of the 2005 workshop on Digital identity management","author":"G.-J. Ahn","year":"2005","unstructured":"Ahn, G.-J., Lam, J.: Managing privacy preferences for federated identity management. In: Proceedings of the 2005 workshop on Digital identity management, Fairfax, VA, USA, November 2005, ACM Press, New York (2005)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1007\/978-3-540-30480-7_10","volume-title":"Web Information Systems \u2013 WISE 2004","author":"G.-J. Ahn","year":"2004","unstructured":"Ahn, G.-J., Shin, D., Hong, S.-P.: Information Assurance in Federated Identity Management: Experimentations and Issues. In: Zhou, X., Su, S., Papazoglou, M.P., Orlowska, M.E., Jeffery, K.G. (eds.) WISE 2004. LNCS, vol.\u00a03306, pp. 78\u201389. Springer, Heidelberg (2004)"},{"key":"4_CR4","volume-title":"Proceedings of the 2005 workshop on Digital identity management","author":"A. Bhargav-Spantzel","year":"2005","unstructured":"Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Establishing and protecting digital identity in federation systems. In: Proceedings of the 2005 workshop on Digital identity management, Fairfax, VA, USA, November 2005, ACM Press, New York (2005)"},{"key":"4_CR5","unstructured":"Brown, K.: Security Briefs: Step-by-Step Guide to InfoCard. MSDN Magazine, Microsoft (April 2006) (accessed April 25, 2006), Available from: \n                    \n                      http:\/\/msdn.microsoft.com\/msdnmag\/issues\/06\/05\/SecurityBriefs\/default.aspx"},{"key":"4_CR6","unstructured":"BusinessWeek online. \u201cBusiness Week\/Harris Poll: A Growing Threat\u201d. (March 2000) (accessed January 16, 2006), Available from: \n                    \n                      http:\/\/businessweek.com\/2000\/00_12\/b3673010.htm"},{"key":"4_CR7","unstructured":"Ellison, G., Madsen, P.: Liberty ID-WSF Security Mechanisms, version 2.0-03, Liberty Alliance Project, Available from: \n                    \n                      http:\/\/www.projectliberty.org\/resources\/specifications.php"},{"key":"4_CR8","unstructured":"Fox, S.: Trust and Privacy Online: Why Americans Want to Rewrite the Rules. Pew Internet & American Life Project (August 2000) (accessed February 17, 2006), Available from: \n                    \n                      http:\/\/www.pewinternet.org\/pdfs\/PIP_Trust_Privacy_Report.pdf"},{"key":"4_CR9","unstructured":"Gartner Group. Industry watchdog Gartner Group (2003), Available from: (accessed October 21, 2005), \n                    \n                      http:\/\/www.gartner.com"},{"key":"4_CR10","volume-title":"Proceedings of the 19th Annual Computer Security Applications Conference","author":"T. Gro\u00df","year":"2003","unstructured":"Gro\u00df, T.: Security analysis of the SAML Single Sign-on Browser\/Artifact profile. In: Proceedings of the 19th Annual Computer Security Applications Conference, December 2003, IEEE, Los Alamitos (2003)"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/11552055_16","volume-title":"Communications and Multimedia Security","author":"W. Hommel","year":"2005","unstructured":"Hommel, W.: Using XACML for Privacy Control in SAML-Based Identity Federations. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS 2005. LNCS, vol.\u00a03677, pp. 160\u2013169. Springer, Heidelberg (2005)"},{"key":"4_CR12","unstructured":"Johnston, S.J.: Pondering Passport: Do You Trust Microsoft With Your Data? PCWorld. com (September 2001) (accessed January 10, 2006), Available from: \n                    \n                      http:\/\/pcworld.about.com\/news\/Sep242001id63244.htm"},{"key":"4_CR13","unstructured":"Kellom\u00e4ki, S., Lockhart, R.: Liberty ID-SIS Personal Profile Service Specification. Version 1.1, Liberty Alliance Project (2003), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/resources\/specifications.php"},{"key":"4_CR14","unstructured":"Landau, S.: Liberty ID-WSF Security & Privacy Overview. Version 1.0, Liberty Alliance Project (2003), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/resources\/specifications.php"},{"key":"4_CR15","unstructured":"Liberty Alliance Project (accessed October 2005), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/"},{"key":"4_CR16","unstructured":"Liberty Alliance Project. Liberty Alliance Whitepaper: Identity Theft Primer (December 2005) (accessed January 2006), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/resources\/id_Theft_Primer_Final.pdf"},{"key":"4_CR17","volume-title":"Proceedings of the 2005 workshop on Digital identity management","author":"P. Madsen","year":"2005","unstructured":"Madsen, P., Takahashi, Y.K.K.: Federated identity management for protecting users from ID theft. In: Proceedings of the 2005 workshop on Digital identity management, Fairfax, VA, USA, November 2005, ACM Press, New York (2005)"},{"key":"4_CR18","unstructured":"OASIS Security Services (SAML) TC. Security Assertion Markup Language (SAML). OASIS Standards (accessed December 2005), Available from: \n                    \n                      http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-540-40956-4_13","volume-title":"Privacy Enhancing Technologies","author":"B. Pfitzmann","year":"2003","unstructured":"Pfitzmann, B.: Privacy in Enterprise Identity Federation - Policies for Liberty Single Signon. In: Dingledine, R. (ed.) PET 2003. LNCS, vol.\u00a02760, pp. 189\u2013204. Springer, Heidelberg (2003)"},{"key":"4_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11542322_20","volume-title":"Security Protocols","author":"B. Pfitzmann","year":"2005","unstructured":"Pfitzmann, B., Waidner, M.: Federated Identity-Management Protocols \u2014 Where User Authentication Protocols Go. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 153\u2013174. Springer, Heidelberg (2005)"},{"key":"4_CR21","volume-title":"Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society","author":"B. Pfitzmann","year":"2002","unstructured":"Pfitzmann, B., Waidner, M.: Privacy in browser-based attribute exchange. In: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, Washington, ACM Press, New York (2002)"},{"key":"4_CR22","unstructured":"SourceID. Digital Identity Basics (accessed December 2005), Available from: \n                    \n                      http:\/\/www.sourceid.org\/content\/primer"},{"key":"4_CR23","volume-title":"Proceedings of the Australasian information security workshop conference on ACSW frontiers","author":"K. Taylor","year":"2003","unstructured":"Taylor, K., Murty, J.: Implementing role based access control for federated information systems on the web. In: Proceedings of the Australasian information security workshop conference on ACSW frontiers, Adelaide, Australia, 2003, vol.\u00a021, ACM Press, New York (2003)"},{"key":"4_CR24","unstructured":"Varney, C., Hartson, H.: Privacy and Security Best Practices. Version 2.0, Liberty Alliance Project (November 2003), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/resources\/specifications.php"},{"key":"4_CR25","unstructured":"Varney, C., Sheckler, V.: Deployment Guidelines for Policy Decision Makers. Version 2.9, Liberty Alliance Project (September 2005), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/about\/whitepapers.php."},{"key":"4_CR26","unstructured":"Wason, T.: Liberty ID-FF Architecture Overview. Version: 1.2-errata-v1.0, Liberty Alliance Project (2004), Available from: \n                    \n                      http:\/\/www.projectliberty.org\/resources\/specifications.php"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11957454_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:21:39Z","timestamp":1619508099000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11957454_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540687900","9783540687931"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/11957454_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}