{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T04:15:10Z","timestamp":1743048910002,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":48,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279362"},{"type":"electronic","value":"9783642279379"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27937-9_2","type":"book-chapter","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T21:56:08Z","timestamp":1335304568000},"page":"17-32","source":"Crossref","is-referenced-by-count":2,"title":["Authentication Session Migration"],"prefix":"10.1007","author":[{"given":"Sanna","family":"Suoranta","sequence":"first","affiliation":[]},{"given":"Jani","family":"Heikkinen","sequence":"additional","affiliation":[]},{"given":"Pekka","family":"Silvekoski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","unstructured":"Accetta, M., Baron, R., Bolosky, W., Golub, D., Rashid, R., Tevanian, A., Young, M.: Mach: A new kernel foundation for UNIX development. In: Proceedings of the Summer USENIX Conference (1986)"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Adeyeye, M., Ventura, N.: A sip-based web client for http session mobility and multimedia services. Computer Communications\u00a033(8) (2010)","DOI":"10.1016\/j.comcom.2010.01.015"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Allard, F., Bonnin, J.M.: An application of the context transfer protocol: IPsec in a IPv6 mobility environment. International Journal of Communication Networks and Distributed Systems\u00a01(1) (2008)","DOI":"10.1504\/IJCNDS.2008.017207"},{"issue":"2","key":"2_CR4","first-page":"5","volume":"7","author":"A. Barak","year":"1995","unstructured":"Barak, A., Laden, O., Yarom, Y.: The NOW MOSIX and its preemptive process migration scheme. Bulletin of the IEEE Technical Committee on Operating Systems and Application Environments\u00a07(2), 5\u201311 (1995)","journal-title":"Bulletin of the IEEE Technical Committee on Operating Systems and Application Environments"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Baratto, R.A., Potter, S., Su, G., Nieh, J.: Mobidesk: mobile virtual desktop computing. In: MobiCom 2004: Proceedings of the 10th Annual International Conference on Mobile Computing and Networking (2004)","DOI":"10.1145\/1023720.1023722"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Bolla, R., Rapuzzi, R., Repetto, M., Barsocchi, P., Chessa, S., Lenzi, S.: Automatic multimedia session migration by means of a context-aware mobility framework. In: Mobility 2009, The 6th International Conference on Mobile Technology, Application & Systems (2009)","DOI":"10.1145\/1710035.1710071"},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Bolla, R., Rapuzzi, R., Repetto, M.: Handling mobility over the network. In: CFI 2009: Proceedings of the 4th International Conference on Future Internet Technologies (2009)","DOI":"10.1145\/1555697.1555710"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Bournelle, J., Laurent-Maknavicius, M., Tschofenig, H., Mghazli, Y.E.: Handover-aware access control mechanism: CTP for PANA. Universal Multiservice Networks (2004)","DOI":"10.1007\/978-3-540-30197-4_43"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Budzisz, L., Ferr\u00fas, R., Brunstrom, A., Grinnemo, K.J., Fracchia, R., Galante, G., Casadevall, F.: Towards transport-layer mobility: Evolution of SCTP multihoming. Computer Communications\u00a031(5) (March 2008)","DOI":"10.1016\/j.comcom.2007.12.014"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Chalandar, M.E., Darvish, P., Rahmani, A.M.: A centralized cookie-based single sign-on in distributed systems. In: ITI 5th International Conference on Information and Communications Technology (ICICT 2007), pp. 163\u2013165 (2007)","DOI":"10.1109\/ITICT.2007.4475639"},{"key":"2_CR11","unstructured":"claimID.com, Inc: claimID (2010), http:\/\/claimid.com (referred 2.8.2010)"},{"key":"2_CR12","unstructured":"Clark, C., Fraser, K., Hand, S., Hansen, J.G., Jul, E., Limpach, C., Pratt, I., Warfield, A.: Live migration of virtual machines. In: NSDI 2005: 2nd Symposium on Networked Systems Desgin and Implementation. USENIX Association (2005)"},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Cui, Y., Nahrstedt, K., Xu, D.: Seamless user-level handoff in ubiquitous multimedia service delivery. Multimedia Tools and Applications\u00a022(2) (February 2004)","DOI":"10.1023\/B:MTAP.0000011932.28891.a0"},{"key":"2_CR14","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The transport layer security (TLS) protocol version 1.1. RFC 4346, IETF (April 2006)","DOI":"10.17487\/rfc4346"},{"key":"2_CR15","unstructured":"Diniz, J.R.B., Ferraz, C.A.G., Melo, H.: An architecture of services for session management and contents adaptation in ubiquitous medical environments. In: SAC 2008: Proceedings of the 2008 ACM Symposium on Applied Computing (2008)"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Douglis, F.: Process migration in the Sprite operating system. In: Proceedings of the 7th International Conference on Distributed Computing Systems, pp. 18\u201325 (1987)","DOI":"10.21236\/ADA619399"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext transfer protocol \u2013 http\/1.1. RFC 2616, IETF (June 1999)","DOI":"10.17487\/rfc2616"},{"key":"2_CR18","unstructured":"Finnish IT center for science (CSC): HAKA federation, http:\/\/www.csc.fi\/english\/institutions\/haka (referred 10.2.2010)"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"Forsberg, D., Ohba, Y., Patil, B., Tschofenig, H., Yesig, A.: Protocol for carrying authentication for network access (PANA). RFC 5191, IETF (May 2008)","DOI":"10.17487\/rfc5191"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1016\/j.comcom.2005.11.021","volume":"30","author":"M. Georgiades","year":"2007","unstructured":"Georgiades, M., Akhtar, N., Politis, C., Tafazolli, R.: Enhancing mobility management protocols to minimise AAA impact on handoff performance. Computer Communications\u00a030, 608\u2013628 (2007)","journal-title":"Computer Communications"},{"key":"2_CR21","unstructured":"Google: Pybluez (bluetooth library for python), http\/\/code.google.com\/p\/pybluez\/ (referred 15.12.2009)"},{"key":"2_CR22","unstructured":"Hager, C., Midkiff, S.: An analysis of bluetooth security vulnerabilities. In: Proceedings of IEEE Wireless Communications and Networking (WCNC 2003) (March 2003)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Hatsugai, R., Saito, T.: Load-balancing SSL cluster using session migration. In: AINA 2007: Proceedings of the 21st International Conference on Advanced Networking and Applications. IEEE Computer Society (May 2007)","DOI":"10.1109\/AINA.2007.85"},{"issue":"9","key":"2_CR24","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1016\/j.ins.2005.02.009","volume":"176","author":"M. Hsieh","year":"2006","unstructured":"Hsieh, M., Wang, T., Sai, C., Tseng, C.: Stateful session handoff for mobile www. Information Sciences\u00a0176(9), 1241\u20131265 (2006)","journal-title":"Information Sciences"},{"key":"2_CR25","unstructured":"Internet2: Shibboleth (2006), http:\/\/shibboleth.internet2.edu\/ (referred 5.9.2006)"},{"key":"2_CR26","unstructured":"Jasig: Central authentication service (CAS), http:\/\/www.jasig.org\/cas (ref. 15.1.2009)"},{"key":"2_CR27","doi-asserted-by":"crossref","unstructured":"Kempf, J.: Problem description: Reasons for performing context transfers between nodes in an IP access network. RFC 3374, IETF (September 2002)","DOI":"10.17487\/rfc3374"},{"key":"2_CR28","unstructured":"Koponen, T., Eronen, P., S\u00e4rel\u00e4, M.: Esilient connections for SSH and TLS. In: USENIX Annual Technical Conference (2006)"},{"key":"2_CR29","unstructured":"KVM: Kvm migration, http:\/\/www.linux-kvm.org\/page\/Migration (referred 27.7.2010)"},{"key":"2_CR30","unstructured":"Livejournal: Livejournal, http:\/\/www.livejournal.com (referred 16.1.2010)"},{"key":"2_CR31","doi-asserted-by":"crossref","unstructured":"Loughney, J., Nakhjiri, M., Perkins, C., Koodli, R.: Context transfer protocol (CXTP). RFC 4067, IETF (July 2005)","DOI":"10.17487\/rfc4067"},{"issue":"3","key":"2_CR32","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/367701.367728","volume":"32","author":"D.S. Milojicic","year":"2000","unstructured":"Milojicic, D.S., Douglis, F., Paindaveine, Y., Wheeler, R., Zhou, S.: Process migration. ACM Compuring Surveys\u00a032(3), 241\u2013299 (2000)","journal-title":"ACM Compuring Surveys"},{"key":"2_CR33","unstructured":"Montenegro, G., Roberts, P., Patil, B.: IP routing for wireless\/mobile hosts (mobileip) (concluded ietf working group) (August 2001), http:\/\/datatracker.ietf.org\/wg\/mobileip\/charter\/ (referred 26.7.2010)"},{"key":"2_CR34","unstructured":"Morgan, P.: nsIFile (mozilla extension reference), http:\/\/developer.mozilla.org\/en\/nsIFile (referred 15.12.2009)"},{"key":"2_CR35","unstructured":"OpenID.net: Openid.net (2008), http:\/\/openid.net\/"},{"key":"2_CR36","unstructured":"OpenSSL: Openssl project (2005), http:\/\/www.openssl.org\/ (referred 17.10.2008)"},{"key":"2_CR37","unstructured":"OpenVZ: Checkpointing and live migration (September 6, 2007), http:\/\/wiki.openvz.org\/Checkpointing_and_live_migration (referred 27.7.2010)"},{"issue":"4","key":"2_CR38","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/4236.865085","volume":"4","author":"J.S. Park","year":"2000","unstructured":"Park, J.S., Sandhu, R.: Secure cookies on the web. IEEE Internet Computing\u00a04(4), 36\u201344 (2000)","journal-title":"IEEE Internet Computing"},{"key":"2_CR39","unstructured":"Ragouzis, N., Hughes, J., Philpott, R., Maler, E., Madsen, P., Scavo, T.: Security assertion markup language (saml) v2.0 technical overview. Tech. rep., OASIS (February 2007)"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Sparks, J.P.R., Handley, M., Schooler, E.: Sip: Session initiation protocol. RFC 3261, IETF (2002)","DOI":"10.17487\/rfc3261"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Samar, V.: Single sign-on using cookies for web applications. In: Proceedings of IEEE 8th International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 1999), pp. 158\u2013163 (June 1999)","DOI":"10.1109\/ENABL.1999.805192"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Shacham, R., Schulzrinne, H., Thakolsri, S., Kellerer, W.: Ubiquitous device personalization and use: The next generation of IP multimedia communications. Transactions on Multimedia Computing, Communications, and Applications (TOMCCAP)\u00a03(2) (May 2007)","DOI":"10.1145\/1230812.1230818"},{"key":"2_CR43","unstructured":"Shepherd, E.: nsICookie (mozilla extension reference), http:\/\/developer.mozilla.org\/en\/nsICookie (referred 15.12.2009)"},{"key":"2_CR44","unstructured":"Shepherd, E.: nsICookieManager (mozilla extension reference), http:\/\/developer.mozilla.org\/en\/nsICookieManager (referred 26.7.2010)"},{"key":"2_CR45","unstructured":"Shepherd, E., Smedberg, B.: nsIProcess (mozilla extension reference) (May 2009), http:\/\/developer.mozilla.org\/en\/nsIProcess (referred 15.12.2009)"},{"key":"2_CR46","unstructured":"Silvekoski, P.: Client-side migration of authentication session. Master\u2019s thesis, Aalto University School of Science and Technology (2010)"},{"key":"2_CR47","unstructured":"Sizzlelab.org: Otasizzle (April 2010), http:\/\/sizl.org\/ (referred 28.7.2010)"},{"key":"2_CR48","doi-asserted-by":"crossref","unstructured":"Stewart, R.: Stream control transmission protocol. RFC 4960, IETF (September 2007)","DOI":"10.17487\/rfc4960"}],"container-title":["Lecture Notes in Computer Science","Information Security Technology for Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27937-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:44:17Z","timestamp":1743000257000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27937-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279362","9783642279379"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27937-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}