{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:39:29Z","timestamp":1725899969876},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642305665"},{"type":"electronic","value":"9783642305672"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30567-2_14","type":"book-chapter","created":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T07:10:40Z","timestamp":1349075440000},"page":"165-177","source":"Crossref","is-referenced-by-count":1,"title":["Architecting Interoperable Privacy within User-Centric Federated Digital Identity Systems: Overview of a Service-Oriented Implementation Framework"],"prefix":"10.1007","author":[{"given":"Ghazi Ben","family":"Ayed","sequence":"first","affiliation":[]},{"given":"Solange","family":"Ghernaouti-H\u00e9lie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","unstructured":"Philippsohn, S.: ID and the Law. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications, pp. 193\u2013203. Gower Publishing Limited (2007)"},{"key":"14_CR2","unstructured":"Cochrane, P.: Forward of the Book. In: Birch, D.G.W. (ed.) Digital Identity Management: Perspectives on the Technological, Business and Social Implications. Gower Publishing Limited (2007)"},{"key":"14_CR3","unstructured":"Cameron, K.: The Laws of Identity. ed: Microsoft Corporation (2005)"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Hansen, M., et al.: Privacy and Identity Management. IEEE Security & Privacy (2008)","DOI":"10.1109\/MSP.2008.41"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Bell, G., Gemmel, J.: A Digital Life. Scientific American Magazine, 58\u201365 (2007)","DOI":"10.1038\/scientificamerican0307-58"},{"key":"14_CR6","unstructured":"International Telecommunication Union. Digital Life. ITU Internet Report (2006), \n                    \n                      http:\/\/www.itu.int\/osg\/spu\/publications\/digitalife\/docs\/digital-life-web.pdf"},{"key":"14_CR7","unstructured":"Windley, P.J.: Digital Identity: Unmasking identity management architecture (IMA). O\u2019Reilly Media (2005)"},{"key":"14_CR8","unstructured":"Cukier, K.: A special report on managing information. The Economist, February 23-March 5 (2010)"},{"key":"14_CR9","unstructured":"Organizing Committee of Digital Identity & Privacy (Human Capital & Social Innovation Technology Summit). Call for Controbution to Managing Digital Identities for Education, Employment and Business Development (2007), \n                    \n                      http:\/\/events.eife-l.org\/HCSIT2007\/overview\/dip\/dip2007"},{"key":"14_CR10","unstructured":"Erl, T.: Service-Oriented Architecture: Concepts, Technology, and Design. Prentice Hall (2005)"},{"key":"14_CR11","unstructured":"Noonan, H.: Identity, in Stanford Encyclopedia of Philosophy, ed. (2009)"},{"key":"14_CR12","unstructured":"Organisation for Economic Co-operation and Development. The Role of Digital Identity Management in the Internet Economy: A primer for policy makers (2009), \n                    \n                      http:\/\/www.oecd.org\/dataoecd\/55\/48\/43091476.pdf"},{"key":"14_CR13","unstructured":"Benantar, M.: Access Control Systems: Security, Identity Management and Trust Models. Springer Science + Business Media (2006)"},{"key":"14_CR14","unstructured":"Ben Ayed, G., Ghernaouti-H\u00e9lie, S.: Privacy Requirements Specification for Digital Identity Management Systems Implementation: Towards a digital society of privacy. In: 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011), Abu Dhabi, UAE (2011)"},{"key":"14_CR15","unstructured":"Center for Democracy & Technology. Privacy Principles for Identity in the Digital Age (Draft for Comment - Version 1.4) (2007), \n                    \n                      http:\/\/www.cdt.org\/files\/pdfs\/20071201_IDPrivacyPrinciples.pdf"},{"key":"14_CR16","unstructured":"Organization for Economic Co-operation and Development (OECD). At Crossroads: Personhood and Digital Identity in the Information Society. The Working Paper series of the OECD Directorate for Science, Technology and Industry (2008), \n                    \n                      http:\/\/www.oecd.org\/LongAbstract\/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html"},{"key":"14_CR17","unstructured":"Lessig, L.: Code and Other Laws of Cyberspace. Basic Books (2000)"},{"key":"14_CR18","unstructured":"Cavoukian, A.: Privacy by Design (2009), \n                    \n                      http:\/\/www.privacybydesign.ca\/pbdbook\/PrivacybyDesignBook.pdf"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Sandhu, R.: Engineering Authority and Trust in Cyberspace: The OM-AM and RABC Way. In: Proceedings of the 5th ACM Workshop on RBAC, pp. 111\u2013119 (2000)","DOI":"10.1145\/344287.344309"},{"key":"14_CR20","unstructured":"Schubert, L., et al.: The Future of Cloud Computing: Opportunities for European cloud computing beyond 2010 (2009), \n                    \n                      http:\/\/cordis.europa.eu\/fp7\/ict\/ssai\/docs\/cloud-report-final.pdf"}],"container-title":["Communications in Computer and Information Science","Networked Digital Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30567-2_14.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:44:58Z","timestamp":1620128698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30567-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642305665","9783642305672"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30567-2_14","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}