{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:40:58Z","timestamp":1725514858138},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540694847"},{"type":"electronic","value":"9783540694854"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69485-4_7","type":"book-chapter","created":{"date-parts":[[2008,6,7]],"date-time":"2008-06-07T05:41:54Z","timestamp":1212817314000},"page":"89-103","source":"Crossref","is-referenced-by-count":0,"title":["Levels of Assurance and Reauthentication in Federated Environments"],"prefix":"10.1007","author":[{"given":"Manuel","family":"S\u00e1nchez","sequence":"first","affiliation":[]},{"given":"\u00d3scar","family":"C\u00e1novas","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"L\u00f3pez","sequence":"additional","affiliation":[]},{"given":"Antonio F.","family":"G\u00f3mez-Skarmeta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"DAMe Project web site, http:\/\/dame.inf.um.es"},{"key":"7_CR2","unstructured":"The Haka federation web site, http:\/\/www.csc.fi\/suomi\/funet\/middleware\/english\/index.phtml"},{"key":"7_CR3","unstructured":"Higgins project web site, http:\/\/www.eclipse.org\/higgins"},{"key":"7_CR4","unstructured":"The InCommon federation web site, http:\/\/www.incommonfederation.org\/"},{"key":"7_CR5","unstructured":"The SWITCH federation web site, http:\/\/www.switch.ch\/aai"},{"key":"7_CR6","unstructured":"Chin, J., Goble, C., Nenadic, A., Zhang, N.: FAME: Adding multi-level authentication to Shibboleth. In: Proceedings of IEEE Conference of E-Science and Grid Computing, Amsterdam Holland (2006)"},{"key":"7_CR7","unstructured":"Alterman, P., Nazario, N., Louden, C.: White paper: e-Authentication partnership policy on levels of assurance of identity for authentication of electronic identity credentials"},{"key":"7_CR8","unstructured":"Bolten, J.B.: E-Authentication Guidance for Federal Agencies (December 2003)"},{"key":"7_CR9","unstructured":"Cantor, S., Kemp, J., Philpott, R., Eve, M.: Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) v2.0, OASIS Standard (March 2005)"},{"key":"7_CR10","unstructured":"Cantor, S., Moreh, J., Philpott, R., Maler, E.: Metadata for the OASIS Security Assertion Markup Language (SAML) v2.0, OASIS Standard (March 2005)"},{"key":"7_CR11","unstructured":"Anderson, A., et al.: EXtensible Access Control Markup Language (XACML) V 1.0, OASIS Standard (February 2003)"},{"key":"7_CR12","unstructured":"L\u00f3pez, D.R., et al.: Deliverable DJ5.2.2,2: G\u00c9ANT2 Authorisation and Authentication Infrastructure (AAI) Architecture - second edition, GN2 JRA5. G\u00c9ANT2 (April 2007)"},{"key":"7_CR13","unstructured":"Wierenga, K., et al.: Deliverable DJ5.1.4: Inter-NREN Roaming Architecture. Description and Development Items, GN2 JRA5. G\u00c9ANT 2 (September 2006)"},{"key":"7_CR14","unstructured":"Kemp, J., Cantor, S., Mishra, P., Philpott, R., Maller, E.: Authentication Context for the OASIS Security Assertion Markup Language (SAML) v2.0, OASIS Standard (March 2005)"},{"key":"7_CR15","unstructured":"L\u00f3pez, D.R., Macias, J., Molina, M., Rauschenbach, J., Solberg, A., Stanica, M.: Deliverable DJ5.2.3,2: Best Practice Guide - AAI Cookbook - Second Edition, GN2 JRA5. G\u00c9ANT 2 (2007)"},{"key":"7_CR16","first-page":"111","volume-title":"Proceedings 4th International Workshop for Applied PKI, IWAP 2005","author":"G. L\u00f3pez","year":"2005","unstructured":"L\u00f3pez, G., C\u00e1novas, O., G\u00f3mez, A.F.: Use of xacml policies for a network access control service. In: Proceedings 4th International Workshop for Applied PKI, IWAP 2005, pp. 111\u2013122. IOS Press, Amsterdam (2005)"},{"key":"7_CR17","unstructured":"Microsoft Corporation. A Technical Reference for InfoCard v1.0 in Windows (August 2005)"},{"key":"7_CR18","unstructured":"Office of the e-Envoy, UK online. e-Government Strategy Framework Policy and Guidelines. Version 2.0 (September 2002)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"S\u00e1nchez, M., L\u00f3pez, G., C\u00e1novas, O., G\u00f3mez-Skarmeta, A.F.: Bootstrapping a global SSO from network access control mechanisms. In: Fourth European PKI Workshop (June 2007)","DOI":"10.1007\/978-3-540-73408-6_12"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Scavo, T., Cantor, S.: Shibboleth Architecture. Technical Overview, Working Draft 02 (June 2005)","DOI":"10.26869\/TI.65.1"},{"key":"7_CR21","unstructured":"Polk, W.T., Burr, W.E., Dodson, D.F.: Electronic Authentication Guideline. Recommendations of the National Institute of Standards and Technology (April 2006)"},{"key":"7_CR22","unstructured":"Zhang, N.: E-Infrastructure Security: An Investigation of Authentication Levels of Assurance (LoAs), Open Grid Forum (2007)"}],"container-title":["Lecture Notes in Computer Science","Public Key Infrastructure"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69485-4_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:41:26Z","timestamp":1620016886000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69485-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540694847","9783540694854"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69485-4_7","relation":{},"subject":[]}}