{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T03:18:20Z","timestamp":1773717500747,"version":"3.50.1"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319186207","type":"print"},{"value":"9783319186214","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18621-4_1","type":"book-chapter","created":{"date-parts":[[2015,5,9]],"date-time":"2015-05-09T07:58:59Z","timestamp":1431158339000},"page":"3-16","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Sabouri","sequence":"first","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,10]]},"reference":[{"key":"1_CR1","unstructured":"X.509: information technology - open systems interconnection - the directory: public\/key and attribute certificate frameworks. \n                    http:\/\/www.itu.int\/rec\/T-REC-X.509\/en"},{"key":"1_CR2","unstructured":"Openid authentication 2.0, December 2007. \n                    http:\/\/openid.net\/specs\/openid-authentication-2_0.html"},{"key":"1_CR3","unstructured":"Assertions and protocols for the OASIS security assertion markup language (saml) v2.0, March 2005. \n                    http:\/\/docs.oasis-open.org\/security\/saml\/v2.0\/saml-core-2.0-os.pdf"},{"key":"1_CR4","unstructured":"Facebook login. \n                    https:\/\/developers.facebook.com\/products\/login\/"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Hardt, D.: Oauth 2.0 authorization protocol, October 2012. \n                    http:\/\/tools.ietf.org\/html\/rfc6749","DOI":"10.17487\/rfc6749"},{"key":"1_CR6","unstructured":"ISO\/IEC 2011: ISO\/IEC 24760\u20131:2011 information technology - security techniques - a framework for identity management - part 1: terminology and concepts, 1st edn. 15\u201312-2011. \n                    http:\/\/standards.iso.org\/ittf\/PubliclyAvailableStandards\/index.html"},{"key":"1_CR7","unstructured":"Rannenberg, K.: Multilateral security - a concept and examples for balanced security. In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000 (NSPW 2000), pp. 151\u2013162. ACM, New York (2000) [Online]. Available: \n                    http:\/\/doi.acm.org\/10.1145\/366173.366208"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21\u201330. ACM (2002)","DOI":"10.1145\/586111.586114"},{"key":"1_CR10","unstructured":"Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Krontiris, I., Lehmann, A., Neven, G., Dam Nielsen, J., Paquin, C., Preiss, F.-S., Rannenberg, K., Sabouri, A., Stausholm, M.: Architecture for attribute-based credential technologies - final version. In: The ABC4Trust EU Project, Deliverable D2.2 (2014). Available at \n                    https:\/\/abc4trust.eu\/download\/Deliverable_D2.2.pdf\n                    \n                  . Last accessed on 08\u201311\u20132014"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for the Future Internet in the Age of Globalisation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18621-4_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T00:26:42Z","timestamp":1559176002000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18621-4_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319186207","9783319186214"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18621-4_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"10 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}