{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:51:39Z","timestamp":1725558699559},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540255840"},{"type":"electronic","value":"9783540319795"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_21","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T16:42:55Z","timestamp":1277916175000},"page":"243-254","source":"Crossref","is-referenced-by-count":5,"title":["An Empirical Study on the Usability of Logout in a Single Sign-on System"],"prefix":"10.1007","author":[{"given":"Mikael","family":"Linden","sequence":"first","affiliation":[]},{"given":"Inka","family":"Vilpola","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Sasse, M.A., Brostoff, S., Weirich, D.: Transforming the \u2018weakest link\u2019 \u2013 a human\/computer interaction approach to usable and effective security. BT Technol. J.\u00a019(3) (2001)","DOI":"10.1023\/A:1011902718709"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/3-540-45067-X_22","volume-title":"Information Security and Privacy","author":"A. Pashalidis","year":"2003","unstructured":"Pashalidis, A., Mitchell, C.: A Taxonomy of Single Sign-On Systems. In: Safavi-Naini, R., Seberry, J. (eds.) ACISP 2003. LNCS, vol.\u00a02727, pp. 249\u2013264. Springer, Heidelberg (2003)"},{"key":"21_CR3","unstructured":"ISO\/IEC (1998b) 9241-11 Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability, ISO\/IEC 9241-11 (1998)"},{"key":"21_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1007\/3-540-45831-X_4","volume-title":"Infrastructure Security","author":"J. Clercq De","year":"2002","unstructured":"De Clercq, J.: Single sign-on architectures. In: Davida, G., Frankel, Y., Rees, O. (eds.) InfraSec 2002. LNCS, vol.\u00a02437, pp. 40\u201358. Springer, Heidelberg (2002)"},{"issue":"1","key":"21_CR5","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1109\/6294.899932","volume":"3","author":"A. Volchkov","year":"2001","unstructured":"Volchkov, A.: Revisiting Single Sign-on. A Pragmatic Approach in a New Context. IEEE IT Professional\u00a03(1), 39\u201345 (2001)","journal-title":"A Pragmatic Approach in a New Context. IEEE IT Professional"},{"key":"21_CR6","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1145\/947469.947514","volume-title":"Proceedings of SIGUCCS 2003 Conference","author":"D. Anchan","year":"2003","unstructured":"Anchan, D., Pegah, M.: Regaining Single Sign-On Taming the Beast. In: Proceedings of SIGUCCS 2003 Conference, pp. 166\u2013171. ACM Press, New York (2003)"},{"key":"21_CR7","unstructured":"Taylor, K., Murty, M.: Implementing Role Based Access Control for Federated Information Systems on the Web. In: Johnson, C., Montague, P., Steketee, C. (eds.) Australasian Information Security Workshop 2003. Australian Computer Society Inc., Sydney, pp. 87\u201395 (2003)"},{"key":"21_CR8","unstructured":"The InCommon Federation. The InCommon Glossary. Available in, \n                    \n                      http:\/\/www.incommonfederation.org\/glossary.cfm\n                    \n                    \n                  , (visited 1\/2005)"},{"key":"21_CR9","unstructured":"Liberty Alliance Project. Liberty ID-FF Protocols and Schema Specification version 1.2. Piscataway, New Jersey (2003)"},{"key":"21_CR10","unstructured":"Internet2\/MACE. The Shibboleth project, \n                    \n                      http:\/\/shibboleth.internet2.edu\/\n                    \n                    \n                  , (visited 1\/2005)"},{"key":"21_CR11","unstructured":"Web Services Federation Language. IBM, Microsoft, VeriSign (2003)"},{"key":"21_CR12","unstructured":"Microsoft.NET passport review guide. Microsoft corporation (2004)"},{"issue":"1","key":"21_CR13","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/S1363-4127(04)00013-5","volume":"9","author":"R. Oppliger","year":"2004","unstructured":"Oppliger, R.: Microsoft.NET Passport and Identity Management. Information Security Technical Report\u00a09(1), 26\u201334 (2004)","journal-title":"Information Security Technical Report"},{"issue":"1-6","key":"21_CR14","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1389-1286(00)00048-7","volume":"33","author":"D. Kormann","year":"2000","unstructured":"Kormann, D., Rubin, A.: Risks of the Passport single signon protocol. Computer Networks\u00a033(1-6), 51\u201358 (2000)","journal-title":"Computer Networks"},{"key":"21_CR15","unstructured":"Nielsen, J.: Ten Usability Heuristics. Available in, \n                    \n                      http:\/\/www.useit.com\/papers\/heuristic\/heuristic_list.html\n                    \n                    \n                  , (visited 1\/2005)"},{"key":"21_CR16","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/844102.844117","volume-title":"New Security Paradigms Workshop 2002","author":"D.K. Smetters","year":"2002","unstructured":"Smetters, D.K., Grinter, R.E.: Moving from the Design of Usable Security Technologies to the Design of Useful Secure Applications. In: New Security Paradigms Workshop 2002, pp. 82\u201389. ACM Press, New York (2002)"},{"key":"21_CR17","unstructured":"University of Washington. Pubcookie: open-source software for intra-institutional web authentication, \n                    \n                      http:\/\/www.pubcookie.org\/\n                    \n                    \n                  , (visited 1\/2005)"},{"key":"21_CR18","first-page":"214","volume-title":"Usability Engineering","author":"J. Nielsen","year":"1993","unstructured":"Nielsen, J.: Usability Engineering, pp. 214\u2013216. Academic Press, San Diego (1993)"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_21.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:44:28Z","timestamp":1620013468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}