{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:59:45Z","timestamp":1725897585572},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642310195"},{"type":"electronic","value":"9783642310201"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31020-1_42","type":"book-chapter","created":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T16:59:14Z","timestamp":1339520354000},"page":"360-367","source":"Crossref","is-referenced-by-count":0,"title":["Identity Manage Interoperation Based on OpenID"],"prefix":"10.1007","author":[{"given":"Shaofeng","family":"Yu","sequence":"first","affiliation":[]},{"given":"Dongmei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jianyong","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s10550-006-0003-3","volume":"23","author":"C.D. Raab","year":"2005","unstructured":"Raab, C.D.: Perspectives on \u2018Personal Identity\u2019. BT Technology Journal\u00a023, 15\u201324 (2005)","journal-title":"BT Technology Journal"},{"key":"42_CR2","unstructured":"JXTA, \n                    \n                      https:\/\/jxta.dev.java.net\/"},{"key":"42_CR3","unstructured":"Open Chord, \n                    \n                      http:\/\/www.uni-bamberg.de\/en\/pi\/bereich\/research\/software_projects\/openchord\/"},{"key":"42_CR4","unstructured":"OpenID, \n                    \n                      http:\/\/openid.net\/"},{"key":"42_CR5","unstructured":"Cavoukian, A.: Laws of Identity: The Case for Privacy-Embedded Laws of Identity in the Digital Age. Information and Privacy Commissioner of Ontario (2006)"},{"key":"42_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2006.169","volume":"4","author":"J. Jonas","year":"2006","unstructured":"Jonas, J.: Threat and Fraud Intelligence, las vegas style. IEEE Security & Privacy Magazine\u00a04, 28\u201334 (2006)","journal-title":"IEEE Security & Privacy Magazine"},{"key":"42_CR7","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJBPIM.2006.012626","volume":"1","author":"R. Farahbod","year":"2007","unstructured":"Farahbod, R., Gl\u00e4sser, U., Vajihollahi, M.: An Abstract Machine Architecture for Web Service based Business Process Management. Intl. Journal of Business Process Integration and Management\u00a01, 279\u2013291 (2007)","journal-title":"Intl. Journal of Business Process Integration and Management"},{"key":"42_CR8","doi-asserted-by":"crossref","unstructured":"Gl\u00e4sser, U., Vajihollahi, M.: Identity Management Architecture. Simon Fraser University, Tech. Rep. SFU-CMPT-TR-2008-02 (February 2008)","DOI":"10.1109\/ISI.2008.4565043"},{"key":"42_CR9","unstructured":"ExtremeSwank OpenID Login OpenID Consumer for ASP1NET210 (EB), \n                    \n                      http:\/\/extremeswank.com\/aspnet-openid.html\n                    \n                    \n                   (accessed January 2, 2008)"},{"issue":"5","key":"42_CR10","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MITP.2006.123","volume":"8","author":"A. Barros","year":"2006","unstructured":"Barros, A., Dumas, M.: The Rise of Web Service Ecosystems. IT Professional\u00a08(5), 31\u201337 (2006)","journal-title":"IT Professional"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31020-1_42","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T00:36:14Z","timestamp":1558312574000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31020-1_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310195","9783642310201"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31020-1_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}