{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:49:16Z","timestamp":1725540556171},"publisher-location":"Boston, MA","reference-count":29,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9781441913241"},{"type":"electronic","value":"9781441913258"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-1-4419-1325-8_6","type":"book-chapter","created":{"date-parts":[[2009,11,6]],"date-time":"2009-11-06T16:33:53Z","timestamp":1257525233000},"page":"97-116","source":"Crossref","is-referenced-by-count":10,"title":["Identity Management Architecture"],"prefix":"10.1007","author":[{"given":"Uwe","family":"Gl\u00e4sser","sequence":"first","affiliation":[]},{"given":"Mona","family":"Vajihollahi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,12]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-18216-7","volume-title":"Abstract State Machines: A Method for High-Level System Design and Analysis","author":"E. B\u00f6rger","year":"2003","unstructured":"E. B\u00f6rger and R. St\u00e4rk. Abstract State Machines: A Method for High-Level System Design and Analysis. Springer-Verlag, Berlin, 2003."},{"key":"6_CR2","unstructured":"K. Cameron. The Laws of Identity [online], December 2005. Available: http:\/\/www.identityblog.com\/?p=354 ."},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MTAS.2004.1337889","volume":"23","author":"J. L. Camp","year":"2004","unstructured":"J. L. Camp. Digital identity. Technology and Society Magazine, IEEE, 23:34\u201341, 2004.","journal-title":"Technology and Society Magazine, IEEE"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"L. J. Camp, et al. Identity in Digital Government: a research report of the Digital Government Civic Scenario Workshop, 2003. Research Report.","DOI":"10.2139\/ssrn.615187"},{"key":"6_CR5","unstructured":"A. Cavoukian. 7 Laws of Identity: The Case for Privacy-Embedded Laws of Identity in the Digital Age, 2006."},{"issue":"2","key":"6_CR6","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/S1389-1286(01)00217-1","volume":"37","author":"S. Clau\u00df","year":"2001","unstructured":"S. Clau\u00df and M. K\u00f6hntopp. Identity Management and its Support of Multilateral Security. Computer Networks, 37(2):205\u2013219, 2001.","journal-title":"Computer Networks"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MIC.2003.1250581","volume":"7","author":"E. Damiani","year":"2003","unstructured":"E. Damiani, S. D. C. di Vimercati, and P. Samarati. Managing multiple and dependable identities. Internet Computing, IEEE, 7:29\u201337, 2003.","journal-title":"Internet Computing, IEEE"},{"key":"6_CR8","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJBPIM.2006.012626","volume":"1","author":"R. Farahbod","year":"2007","unstructured":"R. Farahbod, U. Gl\u00e4sser, and M. Vajihollahi. An Abstract Machine Architecture for Web Service Based Business Process Management. International Journal of Business Process Integration and Management, 1:279\u2013291, 2007.","journal-title":"International Journal of Business Process Integration and Management"},{"key":"6_CR9","unstructured":"Future of Identity in the Information Society \u2013 FIDIS (January 2008 \u2013 last visited) Website. [online]. Available: http:\/\/www.fidis.net ."},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"U. Gl\u00e4sser and M. Vajihollahi. Identity Management Architecture. Technical Report SFU-CMPT-TR-2008-02, Simon Fraser University, February 2008.","DOI":"10.1109\/ISI.2008.4565043"},{"key":"6_CR11","unstructured":"J. Harper. Identity Crisis: How Identification Is Overused and Misunderstood. Cato Institute, 2006."},{"key":"6_CR12","unstructured":"Independent Centre for Privacy Protection Schleswig-Holstein, Germany and Studio Genghini & Associati, Italy. Identity Management Systems (IMS): Identification and Comparison Study, 2003."},{"key":"6_CR13","unstructured":"Javelin Strategy and Research, 2007 Identity Fraud Survey Report, February, 2007."},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2006.169","volume":"4","author":"J. Jonas","year":"2006","unstructured":"J. Jonas. Threat and fraud intelligence, Las Vegas style. Security & Privacy Magazine, IEEE, 4:28\u201334, 2006.","journal-title":"Security & Privacy Magazine, IEEE"},{"key":"6_CR15","unstructured":"Liberty Alliance. Liberty Alliance Identity Federation Framework (ID-FF) 1.2 Specifications, December 2007."},{"key":"6_CR16","unstructured":"Liberty Alliance Project (January 2008 \u2013 last visited) Website. [online]. Available: http:\/\/www.projectliberty.org"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"J. Phiri and J. Agbinya. Modelling and Information Fusion in Digital Identity Management Systems. In Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN\/ICONS\/MCL 2006, 181\u2013187, 2006.","DOI":"10.1109\/ICNICONSMCL.2006.152"},{"key":"6_CR18","unstructured":"PISA \u2013 Privacy Incorporated Software Agent. Information Security, Privacy and Trust. (February 2008 \u2013 last visited) [online]. Available: http:\/\/www.iit-iti.nrc-cnrc.gc.ca\/projectsprojets\/pisa e.html."},{"key":"6_CR19","unstructured":"PRIME \u2013 Privacy and Identity Management for Europe. (January 2008 \u2013 last visited) Website. [online]. Available: http:\/\/www.prime-project.eu ."},{"key":"6_CR20","unstructured":"Public Safety and Emergency Preparedness Canada. Report on Identity Theft, October 2004."},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10550-006-0003-3","volume":"23","author":"C. D. Raab","year":"2005","unstructured":"C. D. Raab. Perspectives on \u2018personal identity\u2019. BT Technology Journal, 23:15\u201324, 2005.","journal-title":"BT Technology Journal"},{"key":"6_CR22","unstructured":"C. Satchell, G. Shanks, S. Howard, and J. Murphy. Beyond security: Implications for the future of federated digital identity management systems. In OZCHI\u201906: Proceedings of the 20th Conference of the Computer\u2013Human Interaction Special Interest Group (CHISIG) of Australia on Computer\u2013Human Interaction: Design: Activities, Artefacts and Environments, ACM, New York, 313\u2013316, 2006."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"S. Sproule and N. Archer. Defining identity theft. In Eighth World Congress on the Management of eBusiness (WCMeB 2007), 20\u201331, 2007.","DOI":"10.1109\/WCMEB.2007.5"},{"key":"6_CR24","unstructured":"G. van Blarkom, J. Borking, J. Giezen, R. Coolen, and P. Verhaar. Handbook of Privacy and Privacy-Enhancing Technologies \u2013 The Case of Intelligent Software Agents. College bescherming persoonsgegevens, 2003."},{"key":"6_CR25","doi-asserted-by":"publisher","first-page":"988","DOI":"10.1109\/TSMCA.2006.871799","volume":"36","author":"G. Wang","year":"2006","unstructured":"G. Wang, H. Chen, J. Xu, and H. Atabakhsh. Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Transactions on Systems, Man and Cybernetics, Part A, 36:988\u2013999, 2006.","journal-title":"IEEE Transactions on Systems, Man and Cybernetics, Part A"},{"key":"6_CR26","volume-title":"Discovering identity problems: A case study. In LNCS: Intelligence and Security Informatics","author":"G. A. Wang","year":"2005","unstructured":"G. A. Wang, H. Atabakhsh, T. Petersen, and H. Chen. Discovering identity problems: A case study. In LNCS: Intelligence and Security Informatics. Springer, Berlin\/Heidelberg, 2005."},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"G. A. Wang, H. Chen, and H. Atabakhsh. A probabilistic model for approximate identity matching. In J. A. B. Fortes and A. Macintosh, editors, Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, CA, May 21\u201324, 2006, 462\u2013463. Digital Government Research Center, 2006.","DOI":"10.1145\/1146598.1146750"},{"key":"6_CR28","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MSP.2006.31","volume":"4","author":"W. Wang","year":"2006","unstructured":"W. Wang, Y. Yuan, and N. Archer. A contextual framework for combating identity theft. Security & Privacy Magazine, IEEE, 4:30\u201338, 2006.","journal-title":"Security & Privacy Magazine, IEEE"},{"key":"6_CR29","unstructured":"P. J. Windley. Digital Identity, chapter Federating Identity. O\u2019Reilly, Sebastopol, CA, 118\u2013142, 2005."}],"container-title":["Annals of Information Systems","Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-1-4419-1325-8_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T05:09:07Z","timestamp":1605676147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-1-4419-1325-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,12]]},"ISBN":["9781441913241","9781441913258"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-1-4419-1325-8_6","relation":{},"ISSN":["1934-3221","1934-3213"],"issn-type":[{"type":"print","value":"1934-3221"},{"type":"electronic","value":"1934-3213"}],"subject":[],"published":{"date-parts":[[2009,10,12]]}}}