{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:23:55Z","timestamp":1725535435939},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642035487"},{"type":"electronic","value":"9783642035494"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03549-4_4","type":"book-chapter","created":{"date-parts":[[2009,7,16]],"date-time":"2009-07-16T06:05:28Z","timestamp":1247724328000},"page":"51-70","source":"Crossref","is-referenced-by-count":7,"title":["Achieving Privacy in a Federated Identity Management System"],"prefix":"10.1007","author":[{"given":"Susan","family":"Landau","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Hubert","family":"Le Van Gong","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Robin","family":"Wilton","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"2","key":"4_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2008.35","volume":"6","author":"A. Acquisti","year":"2008","unstructured":"Acquisti, A.: Identity Management, Privacy, and Price Discrimination. IEEE Security and Privacy\u00a06(2), 46\u201350 (2008)","journal-title":"IEEE Security and Privacy"},{"key":"4_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/11957454_4","volume-title":"Privacy Enhancing Technologies","author":"M. Alsaleh","year":"2006","unstructured":"Alsaleh, M., Adams, C.: Enhancing Consumer Privacy in the Liberty Alliance Identity Federation and Web Services Frameworks. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 59\u201377. Springer, Heidelberg (2006)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Bhargav-Spantzel, A., Squicciarini, A., Bertino, E.: Establishing and Protecting Digital Identity in Federation Systems. CERIAS Tech Report 2007-18","DOI":"10.3233\/JCS-2006-14303"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Gevers, S., Verslype, K., De Decker, B.: Enhancing Privacy in Identity Management Systems. In: Workshop on Privacy in the Electronic Society, pp. 60\u201363 (2007)","DOI":"10.1145\/1314333.1314344"},{"key":"4_CR5","unstructured":"Hardt, D.: Identity 2.0 Keynote, http:\/\/youtube.com\/watch?v=RrpajcAgR1E"},{"key":"4_CR6","unstructured":"idemix for Internet anonymity, http:\/\/www.zurich.ibm.com\/security\/idemix\/ptext.html (last viewed April 29, 2008)"},{"key":"4_CR7","unstructured":"inCommon Federation, http:\/\/www.incommonfederation.org\/"},{"key":"4_CR8","unstructured":"J\u00f8sang, A., AlZomai, M., Suriadi, S.: Usability and Privacy in Identity Managements Systems. In: Australasian Information Security Workshop: Privacy Enhancing Technologies 2007 (2007)"},{"key":"4_CR9","unstructured":"Wason, T. (ed.): Liberty Alliance Project, Liberty ID-FF Architecture Overview, Version 1.2 (2005)"},{"key":"4_CR10","unstructured":"Landau, S. (ed.): Liberty Alliance Project, Liberty ID-WSF Security and Privacy Overview, Version 1.0 (2003)"},{"key":"4_CR11","unstructured":"Varney, C. (ed.): Liberty Alliance Project, Privacy and Security Best Practices, Version 2.0, November 12 (2003)"},{"key":"4_CR12","unstructured":"Varney, C., Sheckler, V. (eds.): Liberty Alliance Project, Deployment Guidelines for Policy Decision Makers, Version 2.9, September 21 (2005)"},{"key":"4_CR13","unstructured":"Liberty Alliance Project, An Overview of the Id Governance Framework, ed (July 2007), http:\/\/projectliberty.org\/liberty\/content\/download\/3500\/23156\/file\/overview-id-governance-framework-v1.0.pdf"},{"key":"4_CR14","unstructured":"Hodges, J., Kemp, J., Aarts, R., Whitehead, G., Madsen, P. (eds.): Liberty Alliance Project, Liberty ID-WSF SOAP Binding Specification, Version 2.0 July 7 (2007), http:\/\/www.projectliberty.org\/liberty\/content\/download\/897\/6267\/file\/liberty-idwsf-soap-binding-v2.0.pdf"},{"key":"4_CR15","unstructured":"Liberty Alliance Papers, http:\/\/projectliberty.org\/liberty\/resource_center\/papers (last viewed March 27, 2008)"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E. Maler","year":"2008","unstructured":"Maler, E., Reed, D.: The Venn of Identity: Options and Issues in Federated Identity Management. IEEE Security and Privacy\u00a06(2), 16\u201323 (2008)","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"4_CR17","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/MSP.2008.51","volume":"6","author":"Robin McKenzie","year":"2008","unstructured":"McKenzie, R., Crompton, M., Wallis, C.: Use Cases for Identity Management in E-Government. IEEE Security and Privacy\u00a06(2), 51\u201357 (March\/April)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"4_CR18","unstructured":"Office of the Chief Information and Privacy Officer, Province of Ontario, Privacy Impact Assessment Guidelines (December 1999) (updated June 2001)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B.: Privacy in Enterprise Identity Federation \u2013Policies for Liberty 2 Single Signon. Elsevier Information Security Technical Report (ISTR), 9\/1, pp. 45\u201358 (2004); preliminary version appeared as Pfitzmann, B.: Privacy in enterprise identity federation. In: Dingledine, R. (ed.) PET 2003, LNCS. vol.\u00a02760, pp. 189\u2013204. Springer, Heidelberg (2003)","DOI":"10.1016\/S1363-4127(04)00015-9"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B., Waidner, M.: Analysis of Liberty Single-Sign-on with Enabled Clients. IEEE Internet Computing, 38\u201344 (November\/December 2003)","DOI":"10.1109\/MIC.2003.1250582"},{"key":"4_CR21","unstructured":"Ranger, S.: NHS e-record opt-out offered. IT Management News, December 19 (2006), http:\/\/news.zdnet.co.uk\/itmanagement\/0,1000000308,39285203,00.htm (last viewed January 18, 2009)"},{"key":"4_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/3-540-46088-8_20","volume-title":"Financial Cryptography","author":"A. Shamir","year":"2002","unstructured":"Shamir, A.: Secureclick: A web payment system with disposable credit card numbers. In: Syverson, P.F. (ed.) FC 2001. LNCS, vol.\u00a02339, pp. 232\u2013242. Springer, Heidelberg (2002)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"276","DOI":"10.1007\/3-540-45472-1_19","volume-title":"Financial Cryptography","author":"S.G. Stubblebine","year":"2001","unstructured":"Stubblebine, S.G., Syverson, P.F.: Authentic Attributes with Fine-Grained Anonymity Protection. In: Frankel, Y. (ed.) FC 2000. LNCS, vol.\u00a01962, pp. 276\u2013294. Springer, Heidelberg (2001)"},{"key":"4_CR24","unstructured":"U-Prove SDK Overview, April 16 (2007), http:\/\/www.credentica.com\/ (last viewed May 3, 2008)"},{"key":"4_CR25","unstructured":"Wilson, Y.: Personal communication"},{"key":"4_CR26","unstructured":"Winn, J.: Information Technology Standards as a Form of Consumer Protection Law. In: Winn, J. (ed.) Consumer Protection in the Age of the Information Economy, Ashgate (2006)"},{"key":"4_CR27","unstructured":"Web Services Policy 1.5 Framework (October 2007), http:\/\/www.w3.org\/TR\/2004\/REC-xmlschema-1-20041028\/"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03549-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,25]],"date-time":"2023-05-25T21:17:42Z","timestamp":1685049462000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03549-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642035487","9783642035494"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03549-4_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}