{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:21:26Z","timestamp":1742916086190,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319644820"},{"type":"electronic","value":"9783319644837"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-64483-7_2","type":"book-chapter","created":{"date-parts":[[2017,7,26]],"date-time":"2017-07-26T13:19:07Z","timestamp":1501075147000},"page":"19-31","source":"Crossref","is-referenced-by-count":1,"title":["Mobile Personal Identity Provider Based on OpenID Connect"],"prefix":"10.1007","author":[{"given":"Luigi Lo","family":"Iacono","sequence":"first","affiliation":[]},{"given":"Nils","family":"Gruschka","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Nehren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,27]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Abe, T., Itoh, H., Takahashi, K.: Implementing identity provider on mobile phone. In: Proceedings of the 2007 ACM Workshop on Digital Identity Management, DIM 2007, pp. 46\u201352. ACM, New York (2007). \nhttp:\/\/doi.acm.org\/10.1145\/1314403.1314412","key":"2_CR1","DOI":"10.1145\/1314403.1314412"},{"unstructured":"Alliance, F.: FIDO UAF Architectural Overview (2016). \nhttps:\/\/fidoalliance.org\/specs\/fido-uaf-v1.1-rd-20161005\/fido-uaf-overview-v1.1-rd-20161005.html","key":"2_CR2"},{"unstructured":"Barnes, R., Mozilla: Use Cases and Requirements for JSON Object Signing and Encryption (JOSE) (2014). \nhttps:\/\/tools.ietf.org\/html\/rfc7165","key":"2_CR3"},{"unstructured":"Bennett, A.: Jose library for ruby. \nhttps:\/\/github.com\/potatosalad\/ruby-jose","key":"2_CR4"},{"unstructured":"Bradley, J., Sakimura, N., Jones, M.: JSON Web Token (JWT) (2015). \nhttps:\/\/tools.ietf.org\/html\/rfc7519","key":"2_CR5"},{"unstructured":"Cisco Systems: cjose - jose library for c\/c++. \nhttps:\/\/github.com\/cisco\/cjose","key":"2_CR6"},{"unstructured":"Connect2id: JOSE + JWT library for Java. \nhttps:\/\/connect2id.com\/products\/nimbus-jose-jwt","key":"2_CR7"},{"issue":"2","key":"2_CR8","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The seven flaws of identity management: usability and security challenges. IEEE Secur. Priv. 6(2), 24\u201329 (2008)","journal-title":"IEEE Secur. Priv."},{"unstructured":"Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2 (2008). \nhttps:\/\/tools.ietf.org\/html\/rfc5246","key":"2_CR9"},{"unstructured":"Facebook: Access Tokens - Facebook Login - Documentation (2017). \nhttps:\/\/developers.facebook.com\/docs\/facebook-login\/access-tokens\/","key":"2_CR10"},{"unstructured":"Ferdous, M.S., Poet, R.: Portable personal identity provider in mobile phones. In: 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 736\u2013745. IEEE (2013). \nhttp:\/\/ieeexplore.ieee.org\/abstract\/document\/6680909\/","key":"2_CR11"},{"unstructured":"Foundation, O.: OpenID Authentication 2.0 (2007). \nhttp:\/\/openid.net\/specs\/openid-authentication-2_0.html","key":"2_CR12"},{"unstructured":"Google: Google Authenticator (2016). \nhttps:\/\/github.com\/google\/google-authenticator","key":"2_CR13"},{"unstructured":"Google: Using OAuth 2.0 to Access Google APIs \n            $$|$$\n           Google Identity Platform (2016). \nhttps:\/\/developers.google.com\/identity\/protocols\/OAuth2","key":"2_CR14"},{"unstructured":"Haller, N.: The S\/KEY One-Time Password System (1995). \nhttps:\/\/tools.ietf.org\/html\/rfc1760","key":"2_CR15"},{"unstructured":"Hardt, D.: The OAuth 2.0 authorization framework (2012). \nhttps:\/\/tools.ietf.org\/html\/rfc6749.txt","key":"2_CR16"},{"issue":"1","key":"2_CR17","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","volume":"14","author":"AK Jain","year":"2004","unstructured":"Jain, A.K., Ross, A., Prabhakar, S.: An introduction to biometric recognition. IEEE Trans. Circuits Syst. Video Technol. 14(1), 4\u201320 (2004)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"unstructured":"Jones, R., Microsoft: JSON Web Key (JWK) (2015). \nhttps:\/\/tools.ietf.org\/html\/rfc7517","key":"2_CR18"},{"key":"2_CR19","first-page":"94","volume":"2","author":"H Lockhart","year":"2008","unstructured":"Lockhart, H., Campbell, B.: Security assertion markup language (SAML) V2.0 technical overview. OASIS Comm. Draft 2, 94\u2013106 (2008). \nhttps:\/\/www.oasis-open.org\/committees\/download.php\/14360\/sstc-saml-tech-overview-2.0-draft-08-diff.pdf","journal-title":"OASIS Comm. Draft"},{"issue":"5","key":"2_CR20","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/MC.2009.141","volume":"42","author":"G Lopez","year":"2009","unstructured":"Lopez, G., Canovas, O., Gomez-Skarmeta, A.F., Girao, J.: A SWIFT take on identity management. Computer 42(5), 58\u201365 (2009)","journal-title":"Computer"},{"issue":"4","key":"2_CR21","first-page":"12","volume":"27","author":"RL Morgan","year":"2004","unstructured":"Morgan, R.L., Cantor, S., Carmody, S., Hoehn, W., Klingenstein, K.: Federated security: the shibboleth approach. Educ. Q. 27(4), 12\u201317 (2004). \nhttp:\/\/eric.ed.gov\/?id=EJ854029","journal-title":"Educ. Q."},{"unstructured":"Rydell, J., M\u2019Raihi, D., Pei, M., Machani, S.: TOTP: Time-based One-time Password Algorithm (2011). \nhttps:\/\/tools.ietf.org\/html\/rfc6238","key":"2_CR22"},{"unstructured":"Sakimura, N., Bradley, J., Jones, M., de Medeiros, B., Mortimore, C.: Openid connect core 1.0. The OpenID Foundation p. S3 (2014). \nhttp:\/\/openid.net\/specs\/openid-connect-core-1_0-final.html","key":"2_CR23"},{"unstructured":"Sun, S.T., Beznosov, K.: The devil is in the (implementation) details: an empirical analysis of OAuth SSO systems. In: Proceedings of the 2012 ACM Conference on Computer and Communications Security, pp. 378\u2013390. ACM (2012). \nhttp:\/\/dl.acm.org\/citation.cfm?id=2382238","key":"2_CR24"},{"doi-asserted-by":"crossref","unstructured":"Thomas, I., Meinel, C.: An identity provider to manage reliable digital identities for SOA and the web. In: Proceedings of the 9th Symposium on Identity and Trust on the Internet, IDTRUST 2010, pp. 26\u201336. ACM, New York (2010). \nhttp:\/\/doi.acm.org\/10.1145\/1750389.1750393","key":"2_CR25","DOI":"10.1145\/1750389.1750393"},{"unstructured":"Twitter: OAuth Twitter Developers (2017). \nhttps:\/\/dev.twitter.com\/oauth","key":"2_CR26"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-64483-7_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,1,18]],"date-time":"2018-01-18T22:24:20Z","timestamp":1516314260000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-64483-7_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319644820","9783319644837"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-64483-7_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}