{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:05:06Z","timestamp":1725469506263},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642334887"},{"type":"electronic","value":"9783642334894"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33489-4_13","type":"book-chapter","created":{"date-parts":[[2012,8,16]],"date-time":"2012-08-16T10:20:56Z","timestamp":1345112456000},"page":"149-161","source":"Crossref","is-referenced-by-count":0,"title":["Cross-Border Legal Identity Management"],"prefix":"10.1007","author":[{"given":"Bernd","family":"Zwattendorfer","sequence":"first","affiliation":[]},{"given":"Arne","family":"Tauber","sequence":"additional","affiliation":[]},{"given":"Klaus","family":"Stranacher","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Reichst\u00e4dter","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Leitold, H., Zwattendorfer, B.: STORK: Architecture, Implementation and Pilots. Securing Electronic Business Processes. ISSE (2010)"},{"key":"13_CR2","unstructured":"European Commission, Study on eID Interoperability for PEGS: Update of Country Profiles. IDABC Programme (2009)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Herkenning, E.: Scheme for eRecognition \u2013 General Introduction, version 1.1 (June 17, 2011)","DOI":"10.4324\/9780203801987-7"},{"key":"13_CR4","first-page":"0012","volume":"013","author":"European Union, Directive 1999\/93\/EC of the European Parliament and of the Council of 13","year":"2000","unstructured":"European Union, Directive 1999\/93\/EC of the European Parliament and of the Council of 13 December 1999 on a Community framework for electronic signatures. Official Journal L 013, 0012\u20130020 (2000)","journal-title":"Official Journal L"},{"key":"13_CR5","unstructured":"Republik \u00d6sterreich, The Austrian E-Government Act - Federal Act on Provisions Facilitating Electronic Communications with Public Bodies. In: Austrian Federal Law Gazette, part I, Nr. 10\/2004; last amended part I, Nr. 111\/2010"},{"key":"13_CR6","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-04280-5_13","volume-title":"Software Services for e-Business and e-Society","author":"T. R\u00f6ssler","year":"2009","unstructured":"R\u00f6ssler, T.: Empowerment through Electronic Mandates \u2013 Best Practice Austria. In: Godart, C., Gronau, N., Sharma, S., Canals, G. (eds.) I3E 2009. IFIP AICT, vol.\u00a0305, pp. 148\u2013160. Springer, Heidelberg (2009)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Leitold, H., Tauber, A.: A Systematic Approach to Legal Identity Management \u2013 Best Practice Austria. In: Proceedings of the Information Security Solutions Europe 2011 Conference, pp. 224\u2013234 (2011)","DOI":"10.1007\/978-3-8348-8652-1_20"},{"key":"13_CR8","unstructured":"MODINIS, The Status of Identity Management in European eGovernment initiatives (2006)"},{"key":"13_CR9","unstructured":"Lockhart, H., Campbell, B.: Security Assertion Markup Language (SAML) V2.0 Technical Overview. OASIS Committee Draft 02 (2008)"},{"key":"13_CR10","unstructured":"Alcalde-Morano, J., Hernndez-Ardieta, J., Johnston, A., Martinez, D., Zwattendorfer, B., Stern, M.: STORK D5.8.3b Interface Specification (2011)"},{"key":"13_CR11","unstructured":"Tauber, A., Zwattendorfer, B., Zefferer, T.: STORK: Pilot 4 Towards Cross-border Electronic Delivery. In: Electronic Government and Electronic Participation- Joint Proceedings of Ongoing Research and Projects of IFIP EGOV and ePart 2011. Springer (2011)"},{"key":"13_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-22961-9_8","volume-title":"Electronic Government and the Information Systems Perspective","author":"T. Knall","year":"2011","unstructured":"Knall, T., Tauber, A., Zefferer, T., Zwattendorfer, B., Axfjord, A., Bjarnason, H.: Secure and Privacy-Preserving Cross-Border Authentication: The STORK Pilot \u2018SaferChat\u2019. In: Andersen, K.N., Francesconi, E., Gr\u00f6nlund, \u00c5., van Engers, T.M. (eds.) EGOVIS 2011. LNCS, vol.\u00a06866, pp. 94\u2013106. Springer, Heidelberg (2011)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33489-4_13.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:16:57Z","timestamp":1643203017000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33489-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642334887","9783642334894"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33489-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}