{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:59:50Z","timestamp":1725562790240},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642137389"},{"type":"electronic","value":"9783642137396"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13739-6_18","type":"book-chapter","created":{"date-parts":[[2010,8,24]],"date-time":"2010-08-24T07:23:50Z","timestamp":1282634630000},"page":"273-286","source":"Crossref","is-referenced-by-count":4,"title":["Towards Privacy-Enhancing Identity Management in Mashup-Providing Platforms"],"prefix":"10.1007","author":[{"given":"Jan","family":"Zibuschka","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Herbert","sequence":"additional","affiliation":[]},{"given":"Heiko","family":"Ro\u00dfnagel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Merrill, D.: Mashups: The new breed of Web app., IBM developerWorks (August 2006)","key":"18_CR1"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1007\/978-3-540-89652-4_62","volume-title":"Service-Oriented Computing \u2013 ICSOC 2008","author":"V. Hoyer","year":"2008","unstructured":"Hoyer, V., Fischer, M.: Market Overview of Enterprise Mashup Tools. In: Bouguettaya, A., Krueger, I., Margaria, T. (eds.) ICSOC 2008. LNCS, vol.\u00a05364, pp. 708\u2013721. Springer, Heidelberg (2008)"},{"key":"18_CR3","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1145\/1367497.1367570","volume-title":"Proceeding of the 17th international conference on World Wide Web","author":"F.D. Keukelaere","year":"2008","unstructured":"Keukelaere, F.D., Bhola, S., Steiner, M., Chari, S., Yoshihama, S.: SMash: secure component model for cross-domain mashups on unmodified browsers. In: Proceeding of the 17th international conference on World Wide Web, pp. 535\u2013544. ACM, Beijing (2008)"},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"611","DOI":"10.1145\/1242572.1242655","volume-title":"Proceedings of the 16th international conference on World Wide Web","author":"C. Jackson","year":"2007","unstructured":"Jackson, C., Wang, H.J.: Subspace: secure cross-domain communication for web mashups. In: Proceedings of the 16th international conference on World Wide Web, pp. 611\u2013620. ACM, Banff (2007)"},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/1455770.1455784","volume-title":"Proceedings of the 15th ACM conference on Computer and communications security","author":"S. Crites","year":"2008","unstructured":"Crites, S., Hsu, F., Chen, H.: OMash: enabling secure web mashups via object abstractions. In: Proceedings of the 15th ACM conference on Computer and communications security, pp. 99\u2013108. ACM, Alexandria (2008)"},{"key":"18_CR6","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1109\/ACSAC.2008.25","volume-title":"Proceedings of the 2008 Annual Computer Security Applications Conference","author":"S. Zarandioon","year":"2008","unstructured":"Zarandioon, S., Yao, D., Ganapathy, V.: OMOS: A Framework for Secure Communication in Mashup Applications. In: Proceedings of the 2008 Annual Computer Security Applications Conference, pp. 355\u2013364. IEEE Computer Society, Los Alamitos (2008)"},{"key":"18_CR7","volume-title":"Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance","author":"T. Mather","year":"2009","unstructured":"Mather, T., Kumaraswamy, S., Latif, S.: Cloud Security and Privacy: An Enterprise Perspective on Risks and Compliance. O\u2019Reilly Media, Sebastopol (2009)"},{"key":"18_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1504\/IJEIM.2007.012175","volume":"7","author":"D.H. Brown","year":"2007","unstructured":"Brown, D.H., Lockett, N.: E-business, innovation and SMEs: the significance of hosted services and firm aggregations. International Journal of Entrepreneurship and Innovation Management\u00a07, 92\u2013112 (2007)","journal-title":"International Journal of Entrepreneurship and Innovation Management"},{"doi-asserted-by":"crossref","unstructured":"Hansen, M., Berlich, P., Camenisch, J., Clau\u00df, S., Pfitzmann, A., Waidner, M.: Privacy-enhancing identity management, Information Security Technical Report, vol. 9, pp. 35\u201344 (2004)","key":"18_CR9","DOI":"10.1016\/S1363-4127(04)00014-7"},{"key":"18_CR10","doi-asserted-by":"publisher","first-page":"1116","DOI":"10.1145\/1247480.1247626","volume-title":"Proceedings of the 2007 ACM SIGMOD international conference on Management of data","author":"R.J. Ennals","year":"2007","unstructured":"Ennals, R.J., Garofalakis, M.N.: MashMaker: mashups for the masses. In: Proceedings of the 2007 ACM SIGMOD international conference on Management of data, pp. 1116\u20131118. ACM, Beijing (2007)"},{"key":"18_CR11","volume-title":"W2SP 2008: Web 2.0 Security and Privacy 2008","author":"T. Close","year":"2008","unstructured":"Close, T.: Web-key: Mashing with permission. In: W2SP 2008: Web 2.0 Security and Privacy 2008. IEEE Computer Society, Oakland (2008)"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/ACSAC.2008.24","volume-title":"Proceedings of the 2008 Annual Computer Security Applications Conference","author":"R. Hasan","year":"2008","unstructured":"Hasan, R., Winslett, M., Conlan, R., Slesinsky, B., Ramani, N.: Please Permit Me: Stateless Delegated Authorization in Mashups. In: Proceedings of the 2008 Annual Computer Security Applications Conference, pp. 173\u2013182. IEEE Computer Society, Los Alamitos (2008)"},{"unstructured":"Open Mashup Alliance: OMA EMML Specification 1.0, http:\/\/www.openmashup.org\/omadocs\/v1.0\/index.html","key":"18_CR13"},{"unstructured":"JackBe: JackBe Mashup Editor and Composer, http:\/\/www.jackbe.com\/products\/composers.php","key":"18_CR14"},{"key":"18_CR15","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B. Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. ACM Commun.\u00a047, 75\u201378 (2004)","journal-title":"ACM Commun."},{"key":"18_CR16","first-page":"14","volume-title":"Proceedings of the 8th conference on USENIX Security Symposium","author":"A. Whitten","year":"1999","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th conference on USENIX Security Symposium, vol.\u00a08, p. 14. USENIX Association, Washington (1999)"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1655028.1655036","volume-title":"Proceedings of the 5th ACM workshop on Digital identity management","author":"S. Zarandioon","year":"2009","unstructured":"Zarandioon, S., Yao, D., Ganapathy, V.: Privacy-aware identity management for client-side mashup applications. In: Proceedings of the 5th ACM workshop on Digital identity management, pp. 21\u201330. ACM, Chicago (2009)"},{"key":"18_CR18","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"R.L. Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. ACM Commun.\u00a021, 120\u2013126 (1978)","journal-title":"ACM Commun."},{"doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. Advances in Cryptology, 47\u201353 (1985)","key":"18_CR19","DOI":"10.1007\/3-540-39568-7_5"},{"key":"18_CR20","doi-asserted-by":"publisher","first-page":"689","DOI":"10.1109\/ICDCS.2008.24","volume-title":"International Conference on Distributed Computing Systems","author":"Z. Guan","year":"2008","unstructured":"Guan, Z., Cao, Z., Zhao, X., Chen, R., Chen, Z., Nan, X.: WebIBC: Identity Based Cryptography for Client Side Security in Web Applications. In: International Conference on Distributed Computing Systems, pp. 689\u2013696. IEEE Computer Society, Los Alamitos (2008)"},{"key":"18_CR21","doi-asserted-by":"publisher","first-page":"52","DOI":"10.1145\/267896.267902","volume":"22","author":"R.A. Kemmerer","year":"1997","unstructured":"Kemmerer, R.A.: Security issues in distributed software. SIGSOFT Softw. Eng. Notes\u00a022, 52\u201359 (1997)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"18_CR22","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1145\/1060745.1060815","volume-title":"Proceedings of the 14th international conference on World Wide Web","author":"J.A. Halderman","year":"2005","unstructured":"Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceedings of the 14th international conference on World Wide Web, pp. 471\u2013479. ACM, Chiba (2005)"},{"doi-asserted-by":"crossref","unstructured":"Kaliski, B.: PKCS #5: Password-Based Cryptography Specification Version 2.0 (2000)","key":"18_CR23","DOI":"10.17487\/rfc2898"},{"unstructured":"Abadi, M., Bharat, K., Marais, J.: System and method for generating unique passwords, U.S. Patent 6141760","key":"18_CR24"},{"key":"18_CR25","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-0-387-77996-6_12","volume-title":"Policies and Research in Identity Management","author":"J. Zibuschka","year":"2008","unstructured":"Zibuschka, J., Ro\u00dfnagel, H.: Implementing Strong Authentication Interoperability with Legacy Systems. In: Policies and Research in Identity Management, pp. 149\u2013160. Springer, Heidelberg (2008)"},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The Seven Flaws of Identity Management: Usability and Security Challenges. IEEE Security & Privacy Magazine\u00a06, 24\u201329 (2008)","journal-title":"IEEE Security & Privacy Magazine"},{"doi-asserted-by":"crossref","unstructured":"de Clerq, J.: Single Sign-on Architectures. In: Proceedings of Infrastructure Security, International Conference, Bristol, UK, pp. 40\u201358 (2002)","key":"18_CR27","DOI":"10.1007\/3-540-45831-X_4"},{"key":"18_CR28","volume-title":"11th Workshop on Hot Topics in Operating Systems","author":"U. Erlingsson","year":"2007","unstructured":"Erlingsson, U., Livshits, B., Xie, Y.: End-to-end Web Application Security. In: 11th Workshop on Hot Topics in Operating Systems. USENIX Association, San Diego (2007)"}],"container-title":["Lecture Notes in Computer Science","Data and Applications Security and Privacy XXIV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13739-6_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T21:42:31Z","timestamp":1606167751000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13739-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642137389","9783642137396"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13739-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}