{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:57:13Z","timestamp":1725533833532},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642026263"},{"type":"electronic","value":"9783642026270"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02627-0_1","type":"book-chapter","created":{"date-parts":[[2009,6,18]],"date-time":"2009-06-18T09:05:54Z","timestamp":1245315954000},"page":"1-14","source":"Crossref","is-referenced-by-count":0,"title":["Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management"],"prefix":"10.1007","author":[{"given":"Bob","family":"Hulsebosch","sequence":"first","affiliation":[]},{"given":"Robert","family":"de Groote","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Snijders","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Nortel. Application Brief: Dynamic Resource Allocation Controller (DRAC) (2006)"},{"key":"1_CR2","unstructured":"OASIS Security Assertion Markup Language (SAML) 2.0 (March 2005), http:\/\/saml.xml.org\/saml-specifications#samlv20"},{"key":"1_CR3","unstructured":"Shibboleth project website, http:\/\/shibboleth.internet2.edu\/"},{"key":"1_CR4","unstructured":"Lockhart, H., et al.: WS-Federation Language, Version 1.1 (2006), http:\/\/www.ibm.com\/developerworks\/library\/specification\/ws-fed\/"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Hulsebosch, R.J., Bargh, M.S., Fennema, P.H., Zandbelt, J.F., Snijders, M., Eertink, E.H.: Using Identity Management and Secure DNS for Effective and Trusted User-controlled Lightpath Establishment. In: International Conference on Networking and Services, ICNS 2006, Silicon Valley, USA, Marriott Hotel, Santa Clara, July 16-19 (2006)","DOI":"10.1109\/ICNS.2006.115"},{"key":"1_CR6","unstructured":"OpenID, http:\/\/openid.net\/"},{"key":"1_CR7","unstructured":"MS Cardspace, http:\/\/msdn.microsoft.com\/en-us\/netframework\/aa663320.aspx"},{"key":"1_CR8","unstructured":"Higgins, http:\/\/www.eclipse.org\/higgins\/"},{"key":"1_CR9","unstructured":"Bournez, C., Bichsel, P.: First Report on Standardisation and Interoperability - Overview and Analysis of Open Source Initiatives, Combined deliverable: Merger of D3.3.1 and D3.4.1, FP7 EU Primelife project, May 30 (2008)"},{"key":"1_CR10","unstructured":"Van der Pol, R., Dijkstra, F.: Network and Capacity Planning in SURFnet6. In: TNC 2009 (2009) (submitted)"},{"issue":"3","key":"1_CR11","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1109\/MCOM.2006.1607872","volume":"44","author":"L. Gommans","year":"2006","unstructured":"Gommans, L., Dijkstra, F., de Laat, C., Tall, A., Wan, A., van Oudenaarde, B., Lavian, T., Monga, I., Travostino, F.: Applications Drive Secure Lightpath Creation across Heterogeneous Domains. IEEE Communications Magazine, Optical Control Planes for Grid Networks: Opportunities, Challenges and the Vision\u00a044(3), 100\u2013106 (2006)","journal-title":"IEEE Communications Magazine, Optical Control Planes for Grid Networks: Opportunities, Challenges and the Vision"},{"key":"1_CR12","unstructured":"Higgins Open Source Identity Framework (2008), http:\/\/www.eclipse.org\/higgins"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Truong, D.L., Cherkaoui, O., Elbiaze, H., Rico, N., Aboulhamid, M.: A Policy-based approach for user-controlled Lightpath Provisioning. In: IFIP\/IEEE NOMS, April 2004, pp. 859\u2013872 (2004)","DOI":"10.1109\/NOMS.2004.1317773"},{"key":"1_CR14","volume-title":"The Grid 2: Blueprint for a New Computing Infrastructure","author":"I. Foster","year":"2003","unstructured":"Foster, I., Kesselman, C.: The Grid 2: Blueprint for a New Computing Infrastructure. Morgan Kaufmann Publishers, San Francisco (2003)"},{"key":"1_CR15","unstructured":"Brown, K., Mani, S.: Microsoft Code Name \u201cGeneva\u201d Framework Whitepaper for Developers (2008)"},{"issue":"2","key":"1_CR16","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/MSP.2008.31","volume":"6","author":"P. Harding","year":"2008","unstructured":"Harding, P., Johansson, L., Klingenstein, N.: Dynamic Security Assertion Markup Language: Simplifying Single Sign-On. IEEE Security & Privacy\u00a06(2), 83\u201385 (2008)","journal-title":"IEEE Security & Privacy"}],"container-title":["Lecture Notes in Computer Science","Scalability of Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02627-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T18:32:13Z","timestamp":1685039533000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02627-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642026263","9783642026270"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02627-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}