{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T21:10:17Z","timestamp":1738962617668,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642004391"},{"type":"electronic","value":"9783642004407"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00440-7_14","type":"book-chapter","created":{"date-parts":[[2009,2,19]],"date-time":"2009-02-19T12:26:52Z","timestamp":1235046412000},"page":"138-147","source":"Crossref","is-referenced-by-count":1,"title":["Secure and Reliable Communication Infrastructure for a Distributed IT-Federation"],"prefix":"10.1007","author":[{"given":"Thang","family":"Tran","sequence":"first","affiliation":[]},{"given":"Kai","family":"Daniel","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Wietfeld","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"German Research Project MobisPro, http:\/\/www.mobis-pro.de"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Wietfeld, C., Wolff, A.: MobileEmerGIS: a wireless-enabled technology platform to efficiently support field forces in protecting critical infrastructure. In: 2007 IEEE Conference on Technologies for Homeland Security, Woburn, USA (May 2007)","DOI":"10.1109\/THS.2007.370019"},{"key":"14_CR3","unstructured":"Goldack, M.: Lesson learned: From MS Passport to Cardspace, Stephen McGibbon\u2019s Web Journal, Horst G\u00f6rtz Institute for IT-Security, Ruhr University Bochum (July 2006)"},{"key":"14_CR4","unstructured":"Liberty Alliance Project, http:\/\/www.projectliberty.org"},{"key":"14_CR5","unstructured":"Internet2, Shibboleth, http:\/\/shibboleth.internet2.edu\/"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Zhang, X., Li, Q., Qing, S., Zhang, H., Zhang, L.: A decentralized RBAC model and its user role administration. In: International Symposium on Communications and Information Technologies, 2007. ISCIT apos;2007, October 17-19, pp. 1280\u20131285 (2007)","DOI":"10.1109\/ISCIT.2007.4392214"},{"key":"14_CR7","unstructured":"OASIS Committee Draft, Technical Overview of OASIS Security Assertion Markup Language (SAML) V1.1 (2004)"},{"key":"14_CR8","unstructured":"IETF, The Transport Layer Security (TLS) Protocol Version 1.2, http:\/\/www.ietf.org"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Zarrar Yousaf, F., M\u00fcller, C., Wietfeld, C.: Multi-Hop Discovery of Candidate Access Routers (MHD-CAR) for Fast Moving Mobile Nodes. In: 19th IEEE International Symposium on Personal, Indoor and Mobile Radio Communication (PIMRC), Cannes, France (September 2008)","DOI":"10.1109\/PIMRC.2008.4699551"},{"key":"14_CR10","unstructured":"Stewart, R.: Stream Control Transmission Protocol (2007), http:\/\/tools.ietf.org\/html\/rfc4960"},{"key":"14_CR11","unstructured":"J. A. Project, Apache JMeter, Jakarta Apache Project Homepage (2007), http:\/\/jakarta.apache.org\/jmeter"},{"key":"14_CR12","unstructured":"Agilent Technologies, http:\/\/www.agilent.com"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Takeda, Y., Kondo, S., Kitayama, Y., Torato, M., Motegi, T.: Avoidance of performance bottlenecks caused by HTTP redirect. identity management protocols. In: Conference on Computer and Communications Security, Proceeding of the second ACM workshop on Digital identity management, Virgina, USA (2006)","DOI":"10.1145\/1179529.1179535"},{"issue":"3","key":"14_CR14","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1109\/TCT.1973.1083657","volume":"20","author":"L. Fratta","year":"1973","unstructured":"Fratta, L., Montanari, U.: A Boolean algebra method for computing the terminal reliability in a communication network. IEEE Transactions on Circuits Theory\u00a020(3), 203\u2013211 (1973)","journal-title":"IEEE Transactions on Circuits Theory"}],"container-title":["Lecture Notes in Computer Science","Mobile Response"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00440-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,7]],"date-time":"2025-02-07T20:32:07Z","timestamp":1738960327000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00440-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642004391","9783642004407"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00440-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}