{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T10:41:28Z","timestamp":1760784088493,"version":"3.41.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319271514"},{"type":"electronic","value":"9783319271521"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-27152-1_11","type":"book-chapter","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T04:55:10Z","timestamp":1449636910000},"page":"203-217","source":"Crossref","is-referenced-by-count":3,"title":["A Practical Trust Framework: Assurance Levels Repackaged Through Analysis of Business Scenarios and Related Risks"],"prefix":"10.1007","author":[{"given":"Masatoshi","family":"Hokino","sequence":"first","affiliation":[]},{"given":"Yuri","family":"Fujiki","sequence":"additional","affiliation":[]},{"given":"Sakura","family":"Onda","sequence":"additional","affiliation":[]},{"given":"Takeaki","family":"Kaneko","sequence":"additional","affiliation":[]},{"given":"Natsuhiko","family":"Sakimura","sequence":"additional","affiliation":[]},{"given":"Hiroyuki","family":"Sato","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"issue":"3","key":"11_CR1","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/1879431","volume":"84","author":"GA Akerlof","year":"1970","unstructured":"Akerlof, G.A.: The market for \u201clemons\u201d: quality uncertainty and the market mechanism. Q. J. Econ. 84(3), 488\u2013500 (1970)","journal-title":"Q. J. Econ."},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Baldwin, A., Mont, M.C., Beres, Y., Shiu, S.: On Identity assurance in the presence of federated identity management systems. In: Proceedings of the International ACM Workshop on Digital Identity Management 2007, pp. 27\u201335 (2007)","DOI":"10.1145\/1314403.1314409"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Burr, W.E., Dodson, D.F., Newton, E.M., Perlner, R.A., Polk, W.T., Gupta, S., Nabbus, E.A.: Electronic Authentication Guidance. NIST SP 800\u201363-2 (2013)","DOI":"10.6028\/NIST.SP.800-63-2"},{"key":"11_CR4","unstructured":"Cabinet of Japan: Guideline for Risk Analysis, Digital Signing, and Authentication for On-line Applications and Processing (2010) (in Japanese). http:\/\/www.kantei.go.jp\/jp\/singi\/it2\/guide\/guide_line\/guideline100831.pdf"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Coats, B., Acharya, S.: The forecast for electronic health record access: partly cloudy. In: Proceedings of the IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 937\u2013942 (2013)","DOI":"10.1145\/2492517.2500329"},{"key":"11_CR6","unstructured":"Federal Identity, Credential, and Access Management Trust Framework Solutions: Trust Framework Provider Adoption Process (TFPAP) For All Levels of Assurance (2014). http:\/\/www.idmanagement.gov\/sites\/default\/files\/documents\/FICAM_TFS_TFPAP_0.pdf"},{"key":"11_CR7","unstructured":"GOV.UK: Introducing GOV.UK Verify (2015). https:\/\/www.gov.uk\/government\/publications\/introducing-govuk-verify\/introducing-govuk-verify"},{"key":"11_CR8","unstructured":"InCommon: The inCommon Assurance Program. http:\/\/www.incommon.org\/assurance\/"},{"key":"11_CR9","unstructured":"ISO: ISO\/IEC 29115:2013, Entity authentication assurance framework (2013)"},{"key":"11_CR10","unstructured":"ITU-T: Recommendation X.1254, Entity authentication assurance framework (2012)"},{"key":"11_CR11","unstructured":"Japanese Bankers Association: FY2013 Financial Statements of All Banks (2014)"},{"key":"11_CR12","unstructured":"Kantara: Identity Assurance. https:\/\/kantarainitiative.org\/idassurance\/"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Noor, A.: Identity protection factor (IPF). In: Proceedings of the IDtrust 2008, pp. 8\u201318 (2008)","DOI":"10.1145\/1373290.1373293"},{"key":"11_CR14","unstructured":"NSTIC: National Strategy for Trusted Identities in Cyberspace. http:\/\/www.nist.gov\/nstic\/"},{"key":"11_CR15","unstructured":"OASIS: Electronic Identity Credential Trust Elevation Framework V 1.0 (2014). http:\/\/docs.oasis-open.org\/trust-el\/trust-el-framework\/v1.0\/trust-el-framework-v1.0.pdf"},{"key":"11_CR16","unstructured":"Office of Management and Budget: M-04-04: E-Authentication Guidance for Federal Agencies (2003)"},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1007\/978-3-642-05151-7_6","volume-title":"On the Move to Meaningful Internet Systems: OTM 2009","author":"H Sato","year":"2009","unstructured":"Sato, H.: N $$\\pm \\epsilon $$ \u00b1 \u03f5 : reflecting local risk assessment in LoA. In: Meersman, R., Dillon, T., Herrero, P. (eds.) OTM 2009, Part II. LNCS, vol. 5871, pp. 833\u2013847. Springer, Heidelberg (2009)"},{"issue":"4","key":"11_CR18","first-page":"166","volume":"1","author":"H Sato","year":"2012","unstructured":"Sato, H.: A formal model of LoA elevation in online trust. ASE Sci. J. 1(4), 166\u2013178 (2012)","journal-title":"ASE Sci. J."},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2014.52","volume":"12","author":"A Slomovic","year":"2014","unstructured":"Slomovic, A.: Privacy issues in identity verification. IEEE Secur. Priv. 12, 71\u201373 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"11_CR20","unstructured":"The General Insurance Association of Japan: Income Statement (2015) (in Japanese)"},{"key":"11_CR21","unstructured":"The Life Insurance Association of Japan: Life Insurance Fact Book 2014 (2014) (in Japanese)"},{"key":"11_CR22","unstructured":"The Ministry of Economy, Trade and Industry: 2013 Survey of Selected Service Industries (2014) (in Japanese)"},{"key":"11_CR23","unstructured":"The Ministry of Economy, Trade and Industry: Digital Content White Paper 2014 (2014) (in Japanese)"},{"key":"11_CR24","unstructured":"The Ministry of Economy, Trade and Industry: Market Research on Electronic Commerce 2015 (2015) (in Japanese). http:\/\/www.meti.go.jp\/press\/2015\/05\/20150529001\/20150529001-3.pdf"},{"key":"11_CR25","unstructured":"The Ministry of Internal Affairs and Communications: White Paper on Information and Communications in Japan (2014) (in Japanese)"},{"key":"11_CR26","unstructured":"The Ministry of Internal Affairs and Communications and the Ministry of Economy, Trade and Industry: 2012 Economic Census for Business Activity (2012) (in Japanese)"},{"key":"11_CR27","unstructured":"The National Police Agency (2010\u20132015) (in Japanese). https:\/\/www.npa.go.jp\/cyber\/statics\/h2 $$\\{$$ { 2-6 $$\\}$$ } ,\/pdf041.pdf"},{"key":"11_CR28","unstructured":"Third Networks Co.: JOGA Security System for On-line Games and Smartphone Games (2011) (in Japanese). http:\/\/www.jssec.org\/dl\/111117_4_amemiya.pdf"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Thomas, I., Meinel, C.: An attribute assurance framework to define and match trust in identity attributes. In: Proceedings of the 2011 IEEE International Conference on Web Services, pp. 580\u2013587 (2011)","DOI":"10.1109\/ICWS.2011.80"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Yong, J., Bertino, E.: Digital identity enrolment and assurance support for VeryIDX. In: Proceedings of the 14th International Conference on Computer Supported Cooperative Work in Design, pp. 734\u2013739 (2010)","DOI":"10.1109\/CSCWD.2010.5471880"}],"container-title":["Lecture Notes in Computer Science","Security Standardisation Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-27152-1_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T18:05:24Z","timestamp":1748714724000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-27152-1_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319271514","9783319271521"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-27152-1_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}