{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,3]],"date-time":"2025-06-03T08:29:13Z","timestamp":1748939353732,"version":"3.37.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_10","type":"book-chapter","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T20:43:14Z","timestamp":1400100194000},"page":"143-153","source":"Crossref","is-referenced-by-count":2,"title":["Privacy-ABCs to Leverage Identity Management as a Service"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Sabouri","sequence":"first","affiliation":[]},{"given":"Ronny","family":"Bjones","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"The NIST Definition of Cloud Computing, \n                    \n                      http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-145\/SP800-145.pdf"},{"key":"10_CR2","unstructured":"Harms, R., Yamartino, M.: The economics of the Cloud, \n                    \n                      http:\/\/www.microsoft.com\/en-us\/news\/presskits\/cloud\/docs\/the-economics-of-the-cloud.pdf"},{"key":"10_CR3","unstructured":"The adoption of cloud-based services, \n                    \n                      http:\/\/www.ca.com\/es\/media\/files\/industryanalystreports\/the-adoption-of-cloud-based-services-increasing-confidence-through-effective-security.pdf"},{"key":"10_CR4","unstructured":"Office 365, \n                    \n                      http:\/\/www.office365.com\/"},{"key":"10_CR5","unstructured":"Google Apps, \n                    \n                      http:\/\/www.google.com\/apps"},{"key":"10_CR6","unstructured":"The future of cloud computing, 3rd annual survey (2013), \n                    \n                      http:\/\/www.northbridge.com\/2013-cloud-computing-survey"},{"issue":"7","key":"10_CR7","first-page":"45","volume":"7","author":"A. Gopalakrishnan","year":"2009","unstructured":"Gopalakrishnan, A.: Cloud computing identity management. SETLabs briefings\u00a07(7), 45\u201354 (2009)","journal-title":"SETLabs briefings"},{"key":"10_CR8","unstructured":"Digital identities and the open business, \n                    \n                      http:\/\/www.ca.com\/cn\/\/media\/files\/industryresearch\/quocirca-digital-identities.pdf"},{"key":"10_CR9","unstructured":"Alliance, C.: Security guidance for critical areas of focus in cloud computing v3. 0. Cloud Security Alliance (2011)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Nunez, D., Agudo, I., Lopez, J.: Integrating openid with proxy re-encryption to enhance privacy in cloud-based identity services. In: 2012 IEEE 4th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 241\u2013248 (2012)","DOI":"10.1109\/CloudCom.2012.6427551"},{"key":"10_CR11","unstructured":"Brodkin, J.: Gartner: Seven cloud-computing security risks (2008)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Pearson, S., Benameur, A.: Privacy, security and trust issues arising from cloud computing. In: 2010 IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 693\u2013702 (2010)","DOI":"10.1109\/CloudCom.2010.66"},{"issue":"6","key":"10_CR13","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2010.186","volume":"8","author":"H. Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J., Ahn, G.-J.: Security and privacy challenges in cloud computing environments. IEEE Security Privacy\u00a08(6), 24\u201331 (2010)","journal-title":"IEEE Security Privacy"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Angin, P., Bhargava, B., Ranchal, R., Singh, N., Linderman, M., Ben Othmane, L., Lilien, L.: An entity-centric approach for privacy and identity management in cloud computing. In: 2010 29th IEEE Symposium on Reliable Distributed Systems, pp. 177\u2013183. IEEE (2010)","DOI":"10.1109\/SRDS.2010.28"},{"key":"10_CR15","unstructured":"Architecture serving complex Identity Infrastructures, \n                    \n                      http:\/\/www.trustindigitallife.eu\/actor\/tdl-publications.html"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1007\/978-3-642-31284-7_31","volume-title":"Applied Cryptography and Network Security","author":"S. Chow","year":"2012","unstructured":"Chow, S., He, Y.-J., Hui, L., Yiu, S.: Spice simple privacy-preserving identity-management for cloud environment. In: Bao, F., Samarati, P., Zhou, J. (eds.) ACNS 2012. LNCS, vol.\u00a07341, pp. 526\u2013543. Springer, Heidelberg (2012), \n                    \n                      http:\/\/dx.doi.org\/10.1007\/978-3-642-31284-7_31"},{"issue":"1","key":"10_CR17","first-page":"21","volume":"32","author":"E. Bertino","year":"2009","unstructured":"Bertino, E., Paci, F., Ferrini, R., Shang, N.: Privacy-preserving digital identity management for cloud computing. IEEE Data Eng. Bull.\u00a032(1), 21\u201327 (2009)","journal-title":"IEEE Data Eng. Bull."},{"key":"10_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-32287-7_21","volume-title":"Trust, Privacy and Security in Digital Business","author":"A. Sabouri","year":"2012","unstructured":"Sabouri, A., Krontiris, I., Rannenberg, K.: Attribute-based credentials for trust (ABC4Trust). In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol.\u00a07449, pp. 218\u2013219. Springer, Heidelberg (2012)"},{"issue":"2","key":"10_CR19","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM\u00a024(2), 84\u201390 (1981)","journal-title":"Communications of the ACM"},{"key":"10_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-642-03356-8_7","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"M. Belenkiy","year":"2009","unstructured":"Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol.\u00a05677, pp. 108\u2013125. Springer, Heidelberg (2009)"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Brands, S.A.: Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"10_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J.L. Camenisch","year":"2001","unstructured":"Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"10_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J.L. Camenisch","year":"2004","unstructured":"Camenisch, J.L., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication (2013)","DOI":"10.1007\/978-3-642-37282-7_4"},{"key":"10_CR25","unstructured":"Microsoft U-Prove, \n                    \n                      http:\/\/www.microsoft.com\/uprove"},{"key":"10_CR26","unstructured":"Identity Mixer, \n                    \n                      http:\/\/idemix.wordpress.com\/"},{"key":"10_CR27","unstructured":"D2.1 Architecture for Attribute-based Credential Technologies Version 1, \n                    \n                      https:\/\/abc4trust.eu\/download\/ABC4Trust-D2.1-Architecture-V1.pdf"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:06:33Z","timestamp":1558890393000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}