{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:38:13Z","timestamp":1775745493246,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319480565","type":"print"},{"value":"9783319480572","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_17","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T00:37:01Z","timestamp":1477096621000},"page":"237-250","source":"Crossref","is-referenced-by-count":10,"title":["A Secure Token-Based Communication for Authentication and Authorization Servers"],"prefix":"10.1007","author":[{"given":"Jan","family":"Kubovy","sequence":"first","affiliation":[]},{"given":"Christian","family":"Huber","sequence":"additional","affiliation":[]},{"given":"Markus","family":"J\u00e4ger","sequence":"additional","affiliation":[]},{"given":"Josef","family":"K\u00fcng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Recordon, D., Reed, D.: OpenID 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management. DIM 2006, pp. 11\u201316. ACM, New York (2006)","DOI":"10.1145\/1179529.1179532"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Hardt, D.: The OAuth 2.0 Authorization Framework. RFC 6749, RFC Editor, October 2012","DOI":"10.17487\/rfc6749"},{"key":"17_CR3","unstructured":"The Apache Software Foundation: SSL\/TLS Configuration HOW-TO (2016). https:\/\/tomcat.apache.org\/tomcat-8.0-doc\/ssl-howto.html#Introduction_to_SSL . Accessed 3 Sept 2016"},{"key":"17_CR4","unstructured":"Trustworthy Internet Movement: SSL Pulse - Survey of the SSL Implementation of the Most Popular Web Sites. https:\/\/www.trustworthyinternet.org\/ssl-pulse . Accessed 3 Sept 2016"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Yang, F., Manoharan, S.: A security analysis of the OAuth protocol. In: 2013 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM), pp. 271\u2013276, August 2013","DOI":"10.1109\/PACRIM.2013.6625487"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Lodderstedt, T., McGloin, M., Hunt, P.: OAuth 2.0 Threat Model and Security Considerations. RFC 6819, RFC Editor, January 2013","DOI":"10.17487\/rfc6819"},{"key":"17_CR7","unstructured":"Sakimura, N., Bradley, J., Jones, M.B., de Medeiros, B., Mortimore, C.: OpenID Connect Core 1.0. The OpenID Foundation, S3 (2014)"},{"key":"17_CR8","unstructured":"The Apache Software Foundation: Apache Oltu: An OAuth Open Source framework. https:\/\/cwiki.apache.org\/confluence\/display\/OLTU\/Index (2013). Accessed 3 Sept 2016"},{"key":"17_CR9","unstructured":"RestLet Inc.: RestLet Framework (2016). https:\/\/restlet.com\/technical-resources\/restlet-framework\/guide\/2.3\/extensions\/oauth . Accessed 3 Sept 2016"},{"key":"17_CR10","unstructured":"Harsta, O.: OAuth-Apis: OAuth Authorization as a Service (2012\u20132016). https:\/\/github.com\/OAuth-Apis\/apis . Accessed 3 Sept 2016"},{"key":"17_CR11","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/bitcoin.org\/bitcoin.pdf . Accessed 3 Sept 2016"},{"key":"17_CR12","unstructured":"Travis, P.: The Bitcoin Revolution: An Internet of Money. Travis Patron (2015) Accessed 3 Sept 2016"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Jones, M.B., Hardt, D.: The OAuth 2.0 Authorization Framework: Bearer Token Usage. RFC 6750, RFC Editor, October 2012","DOI":"10.17487\/rfc6750"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Franks, J., Hallam-Baker, P.M., Hostetler, J.L., Lawrence, S.D., Leach, P.J., Luotonen, A., Stewart, L.C.: HTTP Authentication: Basic and Digest Access Authentication. RFC 2617, RFC Editor, June 1999","DOI":"10.17487\/rfc2617"},{"key":"17_CR15","unstructured":"RSA Security: Information Security, Governance, Risk, and Compliance - EMC (2014). http:\/\/www.rsa.com . Accessed 3 Sept 2016"},{"key":"17_CR16","unstructured":"Barker, E., Barker, W., Burr, W., Polk, T., Smid, M., Zieglar, L.: NIST Special Publication 800-57 Revision 4 Recommendation for Key Management Part 1: General (2016). http:\/\/dx.doi.org\/10.6028\/NIST.Spp. 800-57pt1r4"},{"key":"17_CR17","unstructured":"CLAFIS Project: CLAFIS: crop, livestock and forests integrated system for intelligent automation (2013\u20132016). http:\/\/www.clafis-project.eu EU Seventh Framework Programme NMP.2013.3.0-2"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, RFC Editor, August 2008","DOI":"10.17487\/rfc5246"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T18:47:36Z","timestamp":1568486856000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}