{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:04:54Z","timestamp":1725516294552},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540689782"},{"type":"electronic","value":"9783540689799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-68979-9_7","type":"book-chapter","created":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T12:02:26Z","timestamp":1218542546000},"page":"92-106","source":"Crossref","is-referenced-by-count":0,"title":["A Model for New Zealand\u2019s Identity Verification Service"],"prefix":"10.1007","author":[{"given":"Clark","family":"Thomborson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"State\u00a0Services Commission. Request for Expressions of Interest: All-of-government Authentication Programme - Identity Verification Service - Build Contract. New Zealand (October 2007)"},{"key":"7_CR2","unstructured":"Condon, R.: Jericho Forum puts meat on deperimeterisation (March 14, 2008), \n                    \n                      http:\/\/searchsecurity.techtarget.co.uk\/"},{"key":"7_CR3","unstructured":"Edwards, J.: Privacy Impact Assessment of the All of Government Authentication Programme - Identity Verification Service. New Zealand (December 2005)"},{"key":"7_CR4","unstructured":"The Jericho Forum. Position paper: Collaboration oriented architectures (April 2008), \n                    \n                      http:\/\/www.opengroup.org\/jericho"},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10207-006-0005-7","volume":"5","author":"P. Giorgini","year":"2006","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Requirements engineering for trust management: model, methodology, and reasoning. Int. J. Inf. Sec.\u00a05(4), 257\u2013274 (2006)","journal-title":"Int. J. Inf. Sec."}],"container-title":["Lecture Notes in Computer Science","Trusted Computing - Challenges and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-68979-9_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:21:26Z","timestamp":1620015686000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-68979-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540689782","9783540689799"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-68979-9_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}