{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T02:11:43Z","timestamp":1725761503149},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319038735"},{"type":"electronic","value":"9783319038742"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03874-2_14","type":"book-chapter","created":{"date-parts":[[2013,12,3]],"date-time":"2013-12-03T23:28:48Z","timestamp":1386113328000},"page":"134-144","source":"Crossref","is-referenced-by-count":1,"title":["Future of Cloud-Based Services for Multi-factor Authentication: Results of a Delphi Study"],"prefix":"10.1007","author":[{"given":"Christian","family":"Senk","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Security improvement module","doi-asserted-by":"crossref","DOI":"10.21236\/ADA412014","volume-title":"Outsourcing Managed Security Services","author":"J. Allen","year":"2003","unstructured":"Allen, J., Gabbard, D., May, C.: Outsourcing Managed Security Services. Security improvement module. Carnegie Mellon University, Software Engineering Institute (2003)"},{"key":"14_CR2","unstructured":"amazon web services: AWS Multi-Factor Authentication (2012), http:\/\/aws.amazon.com\/de\/mfa\/"},{"key":"14_CR3","first-page":"199","volume-title":"Proceedings of the 18th International Conferenceof the Association Francophone d\u2019Interaction Homme-Machine, IHM 2006","author":"C. Braz","year":"2006","unstructured":"Braz, C., Robert, J.M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th International Conferenceof the Association Francophone d\u2019Interaction Homme-Machine, IHM 2006, pp. 199\u2013203. ACM, New York (2006)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Clarke, N.L.: Transparent User Authentication - Biometrics, RFID and Behavioural Profiling. Springer (2011)","DOI":"10.1007\/978-0-85729-805-8"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Cowan, N., Morey, C.C., Chen, Z., Gilchrist, A.L., Saults, J.S.: Theory and measurement of working memory capacity limits, pp. 49\u2013104. AP (2008)","DOI":"10.1016\/S0079-7421(08)00002-9"},{"key":"14_CR6","unstructured":"Cranor, L., Garfinkel, S.: Security and Usability. O\u2019Reilly Media, Inc. (2005)"},{"key":"14_CR7","unstructured":"Forrester Research: Authentication-As\u2013A-Service: A commissioned study conducted by Forrester Consulting on behalf of VeriSign (2009), http:\/\/www.verisign.co.uk\/static\/auth-as-a-service.pdf"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-642-22444-7_8","volume-title":"Security and Trust Management","author":"H. Gomi","year":"2011","unstructured":"Gomi, H.: An authentication trust metric for federated identity management systems. In: Cuellar, J., Lopez, J., Barthe, G., Pretschner, A. (eds.) STM 2010. LNCS, vol.\u00a06710, pp. 116\u2013131. Springer, Heidelberg (2011)"},{"key":"14_CR9","unstructured":"Gupta, A., Zhdanov, D.: Growth and sustainability of managed security services networks: an economic perspective. Economics of Information Security, 1\u201335 (2007)"},{"key":"14_CR10","doi-asserted-by":"crossref","unstructured":"H\u00e4der, M.: Delphi-Befragungen: Ein Arbeitsbuch. VS Verlag f\u00fcr SW (2009)","DOI":"10.1007\/978-3-531-91926-3"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"H\u00f6fer, C., Karagiannis, G.: Cloud computing services: taxonomy and comparison. Journal of Internet Services and Applications, 1\u201314 (2011)","DOI":"10.1007\/s13174-011-0027-x"},{"volume-title":"Handbook of Biometrics","year":"2007","key":"14_CR12","unstructured":"Jain, A., Flynn, P., Ross, A. (eds.): Handbook of Biometrics. Springer, New York (2007)"},{"key":"14_CR13","unstructured":"Linstone, H., Turoff, L., Turoff, M.: The Delphi Method: Techniques and Applications (2002)"},{"key":"14_CR14","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O\u2019Reilly Media, Inc. (2009)"},{"issue":"6","key":"14_CR15","first-page":"50","volume":"53","author":"P. Mell","year":"2009","unstructured":"Mell, P., Grance, T.: The NIST Definition of Cloud Computing. National Institute of Standards and Technology\u00a053(6), 50 (2009), http:\/\/csrc.nist.gov\/groups\/SNS\/cloud-computing\/cloud-def-v15.doc","journal-title":"National Institute of Standards and Technology"},{"issue":"1","key":"14_CR16","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1016\/j.im.2003.11.002","volume":"42","author":"C. Okoli","year":"2004","unstructured":"Okoli, C., Pawlowski, S.D.: The Delphi method as a research tool: an example, design considerations and applications. Information & Management\u00a042(1), 15\u201329 (2004)","journal-title":"Information & Management"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Senk, C., Holzapfel, A.: Market overview of security as a service systems. In: Pohlmann, N., Reimer, H., Schneider, W. (eds.) ISSE 2011 Securing Electronic Business Processes (2011)","DOI":"10.1007\/978-3-8348-8652-1_4"},{"key":"14_CR18","volume-title":"Authentication: From passwords to public keys","author":"R.E. Smith","year":"2002","unstructured":"Smith, R.E.: Authentication: From passwords to public keys. Addison-Wesley, Boston (2002)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03874-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,4]],"date-time":"2019-08-04T07:40:35Z","timestamp":1564904435000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-03874-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319038735","9783319038742"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03874-2_14","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2013]]}}}