{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:33:46Z","timestamp":1725536026608},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033148"},{"type":"electronic","value":"9783642033155"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03315-5_14","type":"book-chapter","created":{"date-parts":[[2009,7,25]],"date-time":"2009-07-25T03:15:46Z","timestamp":1248491746000},"page":"184-196","source":"Crossref","is-referenced-by-count":11,"title":["Comparing Identity Management Frameworks in a Business Context"],"prefix":"10.1007","author":[{"given":"Jaap-Henk","family":"Hoepman","sequence":"first","affiliation":[]},{"given":"Rieks","family":"Joosten","sequence":"additional","affiliation":[]},{"given":"Johanneke","family":"Siljee","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., Camenisch, J., Gross, T., Sommer, D.: User Centricity: A Taxonomy and Open Issues. Journal of Computer Security\u00a015(5) (2007)","DOI":"10.3233\/JCS-2007-15502"},{"key":"14_CR2","unstructured":"Blakley, B.: Identity and Community in Human Society. In: Catalyst Conference 2006, June 15 (2006), \n                    \n                      http:\/\/podcast.burtongroup.com\/ip\/\/2006\/06\/identity_and_co.html"},{"key":"14_CR3","unstructured":"Blakley, B.: Ceci n\u2019est pas un Bob, December 7 (2006), \n                    \n                      http:\/\/notabob.blogspot.com\/2006\/07\/meta-identity-system.html"},{"key":"14_CR4","unstructured":"Cameron, K.: The Laws of Identity, May 21 (2005), \n                    \n                      http:\/\/www.identityblog.com\/stories\/2005\/05\/13\/TheLawsOfIdentity.pdf"},{"issue":"2","key":"14_CR5","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The Seven Flaws of Identity Management: Usability and Security Challenges. IEEE Security & Privacy\u00a06(2), 24\u201329 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"14_CR6","unstructured":"Information Card Foundation, \n                    \n                      http:\/\/www.informationcard.net\/"},{"key":"14_CR7","unstructured":"Liberty Alliance Project, An Overview of the Id Governance Framework, Version: 1.0 (2007)"},{"key":"14_CR8","unstructured":"Daemen, T., Rubinstein, I. (eds.): The Identity Metasystem: Towards a Privacy-Compliant Solution to the Challenges of Digital Identity, Microsoft white paper (October 2006), \n                    \n                      http:\/\/identityblog.com\/wp-content\/resources\/Identity_Metasystem_EU_Privacy.pdf"},{"key":"14_CR9","unstructured":"Cameron, K., Jones, M.B.: Design Rationale behind the Identity Metasystem Architecture, \n                    \n                      http:\/\/www.identityblog.com\/wp-content\/resources\/design_rationale.pdf"},{"key":"14_CR10","unstructured":"Liberty Alliance Project, \n                    \n                      http:\/\/www.projectliberty.org"},{"key":"14_CR11","unstructured":"Landau, S., Hodges, J.: A Brief Introduction to Liberty, February 13 (2003), \n                    \n                      http:\/\/research.sun.com\/liberty_intro\/"},{"issue":"2","key":"14_CR12","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E. Maler","year":"2008","unstructured":"Maler, E., Reed, D.: The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security & Privacy\u00a06(2), 16\u201323 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"14_CR13","unstructured":"OpenID specifications, \n                    \n                      http:\/\/openid.net\/developers\/specs\/"},{"key":"14_CR14","unstructured":"Open Source Identity Systems, \n                    \n                      http:\/\/osis.idcommons.net\/"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Royer, D.: Assessing the Value of Enterprise Identity Management (EIdM) - Towards a Generic Evaluation Approach. In: Proc. 3rd Int. Conf. on Availability, Reliability and Security (ARES 2008), Barcelona, Spain, pp. 779\u2013786 (2008)","DOI":"10.1109\/ARES.2008.116"},{"key":"14_CR16","unstructured":"The Shibboleth project, \n                    \n                      http:\/\/shibboleth.internet2.edu\/"},{"key":"14_CR17","unstructured":"Siljee, J., Hoepman, J.-H.: Issues in Identity Management, Usability, Security and Privacy, TNO Whitepaper (2008) (to appear)"}],"container-title":["IFIP Advances in Information and Communication Technology","The Future of Identity in the Information Society"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03315-5_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T02:28:31Z","timestamp":1552098511000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03315-5_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033148","9783642033155"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03315-5_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}