{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:38:19Z","timestamp":1726004299389},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017033"},{"type":"electronic","value":"9783030017040"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01704-0_5","type":"book-chapter","created":{"date-parts":[[2018,12,28]],"date-time":"2018-12-28T11:02:50Z","timestamp":1545994970000},"page":"81-101","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Multi-protocol Authentication Shibboleth Framework and Implementation for Identity Federation"],"prefix":"10.1007","author":[{"given":"Mengyi","family":"Li","sequence":"first","affiliation":[]},{"given":"Chi-Hung","family":"Chi","sequence":"additional","affiliation":[]},{"given":"Chen","family":"Ding","sequence":"additional","affiliation":[]},{"given":"Raymond","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Zhong","family":"She","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,29]]},"reference":[{"key":"5_CR1","unstructured":"OpenSSO. https:\/\/opensso.dev.java.net\/"},{"key":"5_CR2","unstructured":"The Shibboleth Project 2007. http:\/\/shibboleth.net\/"},{"key":"5_CR3","unstructured":"OASIS Security Assertion Markup Language (SAML) V2.0, April 2005. http:\/\/www.oasis-open.org\/"},{"key":"5_CR4","unstructured":"The Liberty Alliance Project. http:\/\/www.projectliberty.org\/"},{"key":"5_CR5","unstructured":"Nanda, A.: Identity selector interoperability profile V1.0. Microsoft Corporation (2007)"},{"key":"5_CR6","unstructured":"OpenID Specifications, OpenID Foundation (2007). http:\/\/openid.net\/developers\/specs\/"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MC.2009.51","volume":"42","author":"M Blaze","year":"2009","unstructured":"Blaze, M., Kannan, S., Lee, I., Sokolsky, O., Keromytis, A., Lee, W.: Dynamic trust management. IEEE Comput. 42(2), 44\u201352 (2009)","journal-title":"IEEE Comput."},{"key":"5_CR8","unstructured":"Cantor, S. (ed.): Shibboleth Architecture. Protocols and Profiles, 10 September (2005). https:\/\/wiki.shibboleth.net\/confluence\/download\/attachments\/2162702\/internet2-mace-shibboleth-archprotocols-200509.pdf"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Grimm, C., Groeper, R.: Trust issues in Shibboleth-enabled federated grid authentication and authorization infrastructures supporting multiple grid middleware. In: Proceedings of the 3rd IEEE International Conference on e-Science and Grid Computing, pp. 569\u2013576 (2007)","DOI":"10.1109\/E-SCIENCE.2007.80"},{"key":"5_CR10","unstructured":"Ragouzis, N., et al.: Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Committee Draft, Document ID sstc-saml-tech-overview-2.0-cd-02, March (2008). http:\/\/www.oasis-open.org\/committees\/download.php\/27819\/sstc-saml-tech-overview-2.0-cd-02.pdf"},{"key":"5_CR11","unstructured":"Lewis, K.D., Lewis, J.E.: Web single sign-on authentication using SAML. Int. J. Comput. Sci., 2 (2009)"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Reed, D., Chasen, L., Tan, W.: OpenID identity discovery with XRI and XRDS. In: Proceedings of the 7th Symposium on Identity and Trust on the Internet, pp. 19\u201325 (2008)","DOI":"10.1145\/1373290.1373294"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Recordon, D., Reed, D.: OpenID 2.0: a platform for user centric identity management. In: Proceedings of the 2nd ACM Workshop on Digital Identity Management, pp. 11\u201316 (2006)","DOI":"10.1145\/1179529.1179532"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Rieger, S.: User-centric identity management in heterogeneous federations. In: Proceedings of the 4th International Conference on Internet and Web Applications and Services, pp. 527\u2013532 (2009)","DOI":"10.1109\/ICIW.2009.85"},{"key":"5_CR15","unstructured":"Barton, T., et al.: Identity federation and attribute-based authorization through the globus toolkit, Shibboleth, GridShib, and MyProxy. In: Proceedings of the 5th Annual PKI R&D Workshop (2006)"},{"key":"5_CR16","unstructured":"Widdowson, R., Cantor, S. (ed.): Identity Provider Discovery Service Protocol and Profile. 27 March (2008). http:\/\/www.oasis-open.org\/committees\/download.php\/28049\/ sstc-saml-idpdiscovery-cs-01.pdf"},{"key":"5_CR17","unstructured":"RFC 2109: HTTP State Management Mechanism, http:\/\/www.ietf.org\/rfc\/rfc2109.txt"},{"key":"5_CR18","unstructured":"Hodges, J.: Technical Comparison: OpenID and SAML, Draft 6. 17 January (2008). http:\/\/identitymeme.org\/doc\/draft-hodges-saml-openid-compare-06.html"},{"key":"5_CR19","unstructured":"Kim, S.H., Jin, S.H., Lim, H.J.: A concept of interoperable authentication framework for dynamic relationship in identity management. In: Proceedings of the 12th International Conference on Advanced Communication Technology, pp. 1635\u20131639 (2010)"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Nenadic, A., Zhan, N., Chin, J., Goble, C.: FAME: adding multilevel authentication to shibboleth. In: Proceedings of IEEE Conference on e-Science and Grid Computing, p. 157 (2006)","DOI":"10.1109\/E-SCIENCE.2006.261044"},{"key":"5_CR21","unstructured":"Hiroyuki, S., Takeshi, N.: Federated authentication in a hierarchy of IdPs by using shibboleth. In: Proceedings of the 11th IEEE\/IPSJ International Symposium on Applications and the Internet, pp. 327\u2013332 (2011)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Almen\u00e1rez, F., Arias, P., Mar\u00edn, A., D\u00edaz, D.: Towards dynamic trust establishment for identity federation. In: Proceedings of the Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship, Article No. 25 (2009)","DOI":"10.1145\/1551722.1551747"},{"key":"5_CR23","unstructured":"Madsen, P.: Proxy Assurance Between OpenID & SAML (2009). http:\/\/kantarainitiative.org\/confluence\/download\/attachments\/3408008\/ntt-madsen-rsa\/concordia.pdf"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Hatakeyama, M., Shima, S.: Privilege federation between different user profiles for service federation. In: Proceedings of the 4th ACM Workshop on Digital Identity Management, pp. 41\u201350 (2008)","DOI":"10.1145\/1456424.1456432"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Hatakeyama, M.: Federation proxy for cross domain identity federation. In: Proceedings of the 5th ACM Workshop on Digital Identity Management, pp. 53\u201362 (2009)","DOI":"10.1145\/1655028.1655041"},{"key":"5_CR26","unstructured":"Takaaki, K., Hiroaki, S., Noritoshi, D., Ken, M.: Design and implementation of web forward proxy with shibboleth authentication. In: Proceedings of the 11th IEEE\/IPSJ International Symposium on Applications and the Internet, pp. 321\u2013326 (2011)"},{"key":"5_CR27","unstructured":"OAuth. http:\/\/oauth.net\/"},{"key":"5_CR28","unstructured":"Higgins. http:\/\/wiki.eclipse.org\/Higgins_2.0\/"},{"key":"5_CR29","unstructured":"OpenID Authentication 2.0 Final, 5 December (2007). http:\/\/openid.net\/specs\/openid-authentication2_0.html"},{"key":"5_CR30","unstructured":"SWITCH AAI ArpViewer, http:\/\/www.switch.ch\/aai\/support\/tools\/arpviewer.html"},{"key":"5_CR31","unstructured":"OpenID.Net, http:\/\/openid.net\/developers\/libraries\/"},{"key":"5_CR32","unstructured":"SimpleSAMLphp. http:\/\/SimpleSAMLphp.org\/"},{"key":"5_CR33","unstructured":"Drupal. http:\/\/drupal.org\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01704-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,13]],"date-time":"2019-11-13T01:02:25Z","timestamp":1573606945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01704-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017033","9783030017040"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01704-0_5","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Singapore","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/securecomm.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}