{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T03:34:39Z","timestamp":1742960079310,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642175688"},{"type":"electronic","value":"9783642175695"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-17569-5_41","type":"book-chapter","created":{"date-parts":[[2010,11,26]],"date-time":"2010-11-26T06:24:09Z","timestamp":1290752649000},"page":"413-428","source":"Crossref","is-referenced-by-count":0,"title":["An Access Control Framework of Federated IPTV Providers for Mobile IPTV Services"],"prefix":"10.1007","author":[{"given":"Mar\u00eda Elizabeth Aldana","family":"D\u00edaz","sequence":"first","affiliation":[]},{"given":"Eui-Nam","family":"Huh","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"5","key":"41_CR1","doi-asserted-by":"publisher","first-page":"409","DOI":"10.1016\/j.clsr.2006.07.008","volume":"22","author":"C. Burbridge","year":"2006","unstructured":"Burbridge, C.: Iptv the dependencies for success. Computer Law & Security Report\u00a022(5), 409\u2013412 (2006), http:\/\/www.sciencedirect.com\/science\/article\/B6VB3-4KTPS50-9\/2\/5f27baff7671b6ac5b02108eb23c7e57","journal-title":"Computer Law & Security Report"},{"issue":"1","key":"41_CR2","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TNSM.2005.4798300","volume":"2","author":"D. Chieng","year":"2005","unstructured":"Chieng, D., Marshall, A., Parr, G.: Sla brokering and bandwidth reservation negotiation schemes for qos-aware internet. IEEE Transactions on Network and Service Management\u00a02(1), 39\u201349 (2005)","journal-title":"IEEE Transactions on Network and Service Management"},{"issue":"1","key":"41_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/TSC.2009.3","volume":"2","author":"D.F. Garc\u00eda","year":"2009","unstructured":"Garc\u00eda, D.F., Garc\u00eda, J., Entrialgo, J., Garc\u00eda, M., Valledor, P., Garc\u00eda, R., Campos, A.M.: A qos control mechanism to provide service differentiation and overload protection to internet scalable servers. IEEE Trans. Serv. Comput.\u00a02(1), 3\u201316 (2009)","journal-title":"IEEE Trans. Serv. Comput."},{"unstructured":"Group, E.P.: Ebu project group b\/ca: Functional model of a conditional access system. ebu technical review winter. Tech. rep., EBU Project Group (1995), http:\/\/www.ebu.ch\/en\/technical\/trev\/trev_266-ca.pdf","key":"41_CR4"},{"unstructured":"Group, E.P.: Ebu project group b\/ca: Functional model of a conditional access system. ebu technical review winter. Tech. rep., EBU Project Group (1995), http:\/\/www.ebu.ch\/en\/technical\/trev\/trev_266-ca.pdf","key":"41_CR5"},{"unstructured":"Group, E.P.: Ebu project group b\/ca: Functional model of a conditional access system. ebu technical review winter. Tech. rep., EBU Project Group (1995), http:\/\/www.ebu.ch\/en\/technical\/trev\/trev_266-ca.pdf","key":"41_CR6"},{"doi-asserted-by":"crossref","unstructured":"Hua, Z., Chunxiao, C., Li, Z., Shiqiang, Y., Lizhu, Z.: Content protection for iptv-current state of the art and challenges. vol.\u00a02, pp. 1680\u20131685 (October 2006)","key":"41_CR7","DOI":"10.1109\/CESA.2006.4281907"},{"key":"41_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1357","DOI":"10.1007\/11915072_39","volume-title":"On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops","author":"J. Jeong","year":"2006","unstructured":"Jeong, J., Shin, D.: An xml-based security architecture for integrating single sign-on and rule-based access control in mobile and ubiquitous web environments. In: Meersman, R., Tari, Z., Herrero, P. (eds.) OTM 2006 Workshops. LNCS, vol.\u00a04278, pp. 1357\u20131366. Springer, Heidelberg (2006), http:\/\/dx.doi.org\/10.1007\/11915072_39"},{"key":"41_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"903","DOI":"10.1007\/978-3-540-30121-9_86","volume-title":"Embedded and Ubiquitous Computing","author":"J. Jeong","year":"2004","unstructured":"Jeong, J., Shin, D., Shin, D., Oh, H.M.: A study on the xml-based single sign-on system supporting mobile and ubiquitous service environments. In: Yang, L.T., Guo, M., Gao, G.R., Jha, N.K. (eds.) EUC 2004. LNCS, vol.\u00a03207, pp. 903\u2013913. Springer, Heidelberg (2004), http:\/\/dx.doi.org\/10.1007\/978-3-540-30121-9_86"},{"doi-asserted-by":"crossref","unstructured":"Lamanna, D.D., Skene, J., Emmerich, W.: Slang a language for defining service level agreements, pp. 100\u2013106 (2003)","key":"41_CR10","DOI":"10.1109\/FTDCS.2003.1204317"},{"doi-asserted-by":"crossref","unstructured":"Lian, S.: Secure service convergence based on scalable media coding. Telecommunication Systems 45, 21\u201335 (2010), http:\/\/dx.doi.org\/10.1007\/s11235-009-9233-2","key":"41_CR11","DOI":"10.1007\/s11235-009-9233-2"},{"issue":"3","key":"41_CR12","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/TSE.2007.28","volume":"33","author":"G. Lodi","year":"2007","unstructured":"Lodi, G., Panzieri, F., Rossi, D., Turrini, E.: Sla-driven clustering of qos-aware application servers. IEEE Transactions on Software Engineering\u00a033(3), 186\u2013197 (2007)","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"41_CR13","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1109\/TBC.2009.2016496","volume":"55","author":"Y. Nishimoto","year":"2009","unstructured":"Nishimoto, Y., Mita, N., Imaizumi, H.: Integrated digital rights management for mobile iptv using broadcasting and communications. IEEE Transactions on Broadcasting\u00a055(2), 419\u2013424 (2009)","journal-title":"IEEE Transactions on Broadcasting"},{"unstructured":"OASIS: Organization for the advancement of structured information standards (oasis), http:\/\/www.oasis-open.org","key":"41_CR14"},{"unstructured":"OASIS: Saml v2.0 executive overview. Tech. rep., Organization for the Advancement of Structured Information StandardS (OASIS) (2005), http:\/\/www.oasis-open.org\/committees\/download.php\/13525\/sstc-saml-exec-overview-2.0-cd-01-2col.pdf","key":"41_CR15"},{"unstructured":"OASIS: Security assertion markup language (saml) v2.0 technical overview. Tech. rep., Organization for the Advancement of Structured Information Standards (OASIS) (2008), http:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0-cd-02.html","key":"41_CR16"},{"key":"41_CR17","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/s11235-009-9232-3","volume":"45","author":"J. Park","year":"2010","unstructured":"Park, J.: Subscriber authentication technology of aaa mechanism for?mobile iptv service offer. Telecommunication Systems\u00a045, 37\u201345 (2010), http:\/\/dx.doi.org\/10.1007\/s11235-009-9232-3","journal-title":"Telecommunication Systems"},{"doi-asserted-by":"crossref","unstructured":"Park, S., Jeong, S.H., Hwang, C.: Mobile iptv expanding the value of iptv. In: International Conference on Networking, pp. 296\u2013301 (2008)","key":"41_CR18","DOI":"10.1109\/ICN.2008.8"},{"issue":"8","key":"41_CR19","doi-asserted-by":"publisher","first-page":"1446","DOI":"10.1016\/j.techfore.2006.05.007","volume":"74","author":"D.H. Shin","year":"2007","unstructured":"Shin, D.H.: Potential user factors driving adoption of iptv. what are customers expecting from iptv? Technological Forecasting and Social Change\u00a074(8), 1446\u20131464 (2007), http:\/\/www.sciencedirect.com\/science\/article\/B6V71-4K7WJ16-1\/2\/8ef3650782581658cfebd54eb7c57207","journal-title":"Technological Forecasting and Social Change"},{"doi-asserted-by":"crossref","unstructured":"Tiwari, P., Joshi, S.: Single sign-on with one time password, pp. 1 \u20134 (November 2009)","key":"41_CR20","DOI":"10.1109\/AHICI.2009.5340290"}],"container-title":["Lecture Notes in Computer Science","Future Generation Information Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-17569-5_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,28]],"date-time":"2025-02-28T06:37:42Z","timestamp":1740724662000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-17569-5_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642175688","9783642175695"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-17569-5_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}