{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:46:58Z","timestamp":1725551218686},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_13","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"183-198","source":"Crossref","is-referenced-by-count":0,"title":["Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML"],"prefix":"10.1007","author":[{"given":"Sergio","family":"S\u00e1nchez Garc\u00eda","sequence":"first","affiliation":[]},{"given":"Ana","family":"G\u00f3mez Oliva","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Liberty Alliance Project, http:\/\/www.projectliberty.org"},{"key":"13_CR2","unstructured":"Wason, T.: Liberty ID-FF Architecture Overview. Version: 1.2-errata-v1.0. Liberty Alliance Project (2005), http:\/\/www.projectliberty.org\/liberty\/content\/download\/318\/2366\/file\/draft-liberty-idff-arch-overview-1.2-errata-v1.0.pdf"},{"key":"13_CR3","unstructured":"The Modinis IDM Study Team; Modinis Study on Identity Management in eGovernment: Common Terminological Framework for Interoperable Electronic Identity Management. Version 2.01. eGovernment Unit, DG Information Society and Media, European Commission, November 23 (2005)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Komura, T., Nagai, Y., Hashimoto, S., Aoyagi, M., Takahashi, K.: Proposal of Delegation Using Electronic Certificates on Single Sign-On System with SAML-Protocol. In: SAINT \u201909. Ninth Annual International Symposium on Applications and the Internet, July 20-24 (2009)","DOI":"10.1109\/SAINT.2009.53"},{"key":"13_CR5","unstructured":"Alrodhan, W., Mitchell, C.J.: A Delegation Framework for Liberty. In: Proceedings of the 3rd Conference on Advances in Computer Security and Forensics (ACSF\u201908), pp. 67\u201373 (2008)"},{"key":"13_CR6","doi-asserted-by":"crossref","unstructured":"Gomi, H., Hatakeyama, M., Hosono, S., Fujita, S.: A delegation framework for federated identity management. In: Proceedings of the 2005 workshop on Digital identity management, Fairfax, VA, USA, November 11 (2005)","DOI":"10.1145\/1102486.1102502"},{"key":"13_CR7","unstructured":"Welch, V., Foster, I., Kesselman, C., Mulmo, O., Pearlman, L., Tuecke, S., Gawor, J., Meder, S., Siebenlist, F.: X.509 Proxy Certificates for Dynamic Delegation. In: 3rd Annual PKI R&D Workshop (2004)"},{"key":"13_CR8","unstructured":"Peeters, R., Simoens, K., De Cock, D., Preneel, B.: Cross-Context Delegation through Identity Federation. In: Br\u00f6mme, A., Busch, C., H\u00fchnlein, D. (eds.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures. LNI, vol.\u00a0P-137, pp. 79\u201392. Bonner K\u00f6llen Verlag (2008)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Tuecke, S., Welch, V., Engert, D., Pearlman, L., Thompson, M.: Internet X.509 Public Key Infrastructure Proxy Certificate Profile. RFC3820, IETF (June 2004)","DOI":"10.17487\/rfc3820"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization, RFC 3281, IETF (April 2002)","DOI":"10.17487\/rfc3281"},{"key":"13_CR11","unstructured":"Ragouzis, N., Hughes, J., Philpott, R., Maler, E., Madsen, P., Scavo, T.: Security Assertion Markup Language (SAML) V2.0 Technical Overview - Committee Draft 02 (March 25, 2008), http:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0.pdf"},{"key":"13_CR12","unstructured":"GridShib, http:\/\/gridshib.globus.org\/"},{"key":"13_CR13","unstructured":"Globus Toolkit\u00ae, http:\/\/www.globus.org\/toolkit\/"},{"key":"13_CR14","unstructured":"Shibboleth\u00ae, http:\/\/shibboleth.internet2.edu\/"},{"key":"13_CR15","unstructured":"https:\/\/spaces.internet2.edu\/display\/GS\/X509BindingSAML"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Masinter, R.: Uniform Resource Identifier (URI): Generic Syntax. RFC 3986, IETF (January 2005)","DOI":"10.17487\/rfc3986"},{"key":"13_CR17","doi-asserted-by":"crossref","unstructured":"Housley, R., Polk, W., Ford, W., Solo, D.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280, IETF (April 2002)","DOI":"10.17487\/rfc3280"},{"key":"13_CR18","unstructured":"ModinisIDM, https:\/\/www.cosic.esat.kuleuven.be\/modinis-idm\/twiki\/bin\/view.cgi\/Main\/WebHome"},{"key":"13_CR19","unstructured":"Bruegger, B.P., H\u00fchnlein, D., Schwenk, J.: TLS-Federation - a Secure and Relying-Party-Friendly Approach for Federated Identity Management, http:\/\/porvoo14.dvla.gov.uk\/documents\/tls_federation_final.pdf"},{"key":"13_CR20","unstructured":"GUIDE, Creating a European Identity Management Architecture for eGovernment, http:\/\/istrg.som.surrey.ac.uk\/projects\/guide\/overview.html"},{"key":"13_CR21","unstructured":"STORK, Secure idenTity acrOss boRders linked, http:\/\/www.eid-stork.eu\/"},{"key":"13_CR22","unstructured":"PEPPOL, Pan-European Public Procurement Online, http:\/\/www.peppol.eu\/"},{"key":"13_CR23","unstructured":"Commission of the European Communities; i2010 eGovernment Action Plan: Accelerating Government in Europe for the Benefit of All. Brussels (April 2006), http:\/\/ec.europa.eu\/idabc\/servlets\/Doc?id=25286"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,28]],"date-time":"2019-05-28T01:44:55Z","timestamp":1559007895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}