{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:38:10Z","timestamp":1725557890551},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540206101"},{"type":"electronic","value":"9783540409564"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/978-3-540-40956-4_13","type":"book-chapter","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T19:02:02Z","timestamp":1277233322000},"page":"189-204","source":"Crossref","is-referenced-by-count":16,"title":["Privacy in Enterprise Identity Federation"],"prefix":"10.1007","author":[{"given":"Birgit","family":"Pfitzmann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28\/10","author":"D. Chaum","year":"1985","unstructured":"Chaum, D.: Security without Identification: Transaction Systems to make Big Brother Obsolete. Communications of the ACM\u00a028\/10, 1030\u20131044 (1985)","journal-title":"Communications of the ACM"},{"key":"13_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J. Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013117. Springer, Heidelberg (2001)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and Implementation of the Idemix Anonymous Credential System. In: 9th ACM Conference on Computer and Communications Security (CCS), pp. 21\u201330","DOI":"10.1145\/586110.586114"},{"key":"13_CR4","unstructured":"Clau\u00df, S., Pfitzmann, A., Hansen, M., Van Herreweghen, E.: Privacy- Enhancing Identity Management. The IPTS Report (67) (2002), http:\/\/www.jrc.es\/pages\/iptsreport\/vol67\/english\/IPT2E676.html"},{"key":"13_CR5","unstructured":"IBM: Enterprise Security Architecture using IBM Tivoli Security Solutions (April 2002), http:\/\/www.redbooks.ibm.com\/abstracts\/sg246014.html"},{"key":"13_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1389-1286(00)00048-7","volume":"33","author":"D.P. Kormann","year":"2001","unstructured":"Kormann, D.P., Rubin, A.D.: Risks of the Passport Single Signon Protocol. Computer Networks\u00a033, 51\u201358 (2001)","journal-title":"Computer Networks"},{"key":"13_CR7","unstructured":"Liberty Alliance Project: Liberty Architecture Overview, Version 1.0, July 11 (2002)"},{"key":"13_CR8","unstructured":"Liberty Alliance Project: Liberty Protocols and Schemas Specification, Version 1.0, July 11 (2002)"},{"key":"13_CR9","unstructured":"Liberty Alliance Project: Liberty Bindings and Profiles Specification, Version 1.0, July 11 (2002)"},{"key":"13_CR10","unstructured":"Microsoft Corporation: Various.NET Passport documentation (started 1999), in particular Technical Overview (September 2001), and SDK 2.1 Documentation and http:\/\/www.passport.com , http:\/\/www.passport.com"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Privacy in Browser-Based Attribute Exchange. In: ACM Workshop on Privacy in the Electronic Society. post conference, Washington. ACM (November 2002)","DOI":"10.1145\/644527.644533"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: BBAE \u2212 A General Protocol for Browser-based Attribute Exchange. IBM Research Report RZ 3455 (# 93800) (September 2002), http:\/\/www.zurich.ibm.com\/security\/publications\/2002.html","DOI":"10.1145\/644527.644533"},{"key":"13_CR13","unstructured":"OASIS Security Assertion Markup Language (SAML). Committee specification 01 (May 2002) (started January 2001), http:\/\/www.oasis-open.org\/committees\/security\/docs"},{"key":"13_CR14","unstructured":"Shibboleth-Architecture Draft v05 (May 2002), http:\/\/middleware.internet2.edu\/shibboleth\/docs\/draft-internet2-shibboleth-arch-v05.pdf"},{"key":"13_CR15","unstructured":"Slemko, M.: Microsoft Passport to Trouble. Rev. 1.18 (November 2001), http:\/\/alive.znep.com\/~marcs\/passport\/"},{"key":"13_CR16","volume-title":"Privacy and Freedom","author":"A.F. Westin","year":"1967","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"}],"container-title":["Lecture Notes in Computer Science","Privacy Enhancing Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-40956-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T09:36:57Z","timestamp":1559209017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-40956-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540206101","9783540409564"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-40956-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2003]]}}}