{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:40:04Z","timestamp":1744000804396,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334269"},{"type":"electronic","value":"9783642334276"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33427-6_21","type":"book-chapter","created":{"date-parts":[[2012,8,23]],"date-time":"2012-08-23T09:38:39Z","timestamp":1345714719000},"page":"244-258","source":"Crossref","is-referenced-by-count":8,"title":["Simplified Authentication and Authorization for RESTful Services in Trusted Environments"],"prefix":"10.1007","author":[{"given":"Eric","family":"Brachmann","sequence":"first","affiliation":[]},{"given":"Gero","family":"Dittmann","sequence":"additional","affiliation":[]},{"given":"Klaus-Dieter","family":"Schubert","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"MIT: Kerberos: The network authentication protocol, http:\/\/web.mit.edu\/kerberos\/"},{"key":"21_CR2","unstructured":"Schemers, R., Allbery, R.: WebAuth technical specification, http:\/\/webauth.stanford.edu\/protocol.html"},{"key":"21_CR3","unstructured":"Mazurek, D.: CAS protocol (May 2005), http:\/\/www.jasig.org\/cas\/protocol"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Samar, V.: Single sign-on using cookies for web applications. In: Proceedings of the 8th Intl. Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE 1999), Stanford, CA, USA, pp. 158\u2013163. IEEE (1999)","DOI":"10.1109\/ENABL.1999.805192"},{"key":"21_CR5","unstructured":"OASIS: SAML specifications, http:\/\/saml.xml.org\/saml-specifications"},{"key":"21_CR6","unstructured":"OASIS: OASIS eXtensible Access Control Markup Language (XACML) TC, http:\/\/www.oasis-open.org\/committees\/xacml\/"},{"key":"21_CR7","unstructured":"Mirza, Q.K.A.: Restful implementation of authorization mechanisms. In: Proceedings of the International Conference on Technology and Business Management (ICTBM 2011), Dubai, UAE, pp. 1001\u20131010. INFOMS (March 2011)"},{"key":"21_CR8","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/4236.895139","volume":"5","author":"K. Gutzmann","year":"2001","unstructured":"Gutzmann, K.: Access control and session management in the HTTP environment. IEEE Internet Computing\u00a05, 26\u201335 (2001)","journal-title":"IEEE Internet Computing"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Graf, S., Zholudev, V., Lewandowski, L., Waldvogel, M.: Hecate, managing authorization with RESTful XML. In: Proceedings of the 2nd International Workshop on RESTful Design (WS-REST 2011), Hyderabad, India, pp. 51\u201358. ACM (March 2011)","DOI":"10.1145\/1967428.1967442"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Recordon, D., Reed, D.: OpenID 2.0: A platform for user-centric identity management. In: Proceedings of the 2nd Workshop on Digital Identity Management (DIM 2006), Fairfax, Virginia, USA, pp. 11\u201316. ACM (November 2006)","DOI":"10.1145\/1179529.1179532"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Hammer-Lahav, E.: The OAuth 1.0 protocol. RFC 5849, IETF (April 2010)","DOI":"10.17487\/rfc5849"},{"key":"21_CR12","unstructured":"Jazz Community: Jazz, https:\/\/jazz.net\/"},{"key":"21_CR13","unstructured":"ANSI: American national standard for information technology \u2013 Role based access control. ANSI INCITS 359-2004, ANSI (February 2004)"},{"key":"21_CR14","unstructured":"Zukowski, M.: RubyCAS-Server, http:\/\/code.google.com\/p\/rubycas-server\/"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented and Cloud Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33427-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T04:05:46Z","timestamp":1743998746000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33427-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334269","9783642334276"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33427-6_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}