{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T16:19:25Z","timestamp":1725898765800},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642339981"},{"type":"electronic","value":"9783642339998"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33999-8_5","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T11:27:25Z","timestamp":1350473245000},"page":"34-43","source":"Crossref","is-referenced-by-count":5,"title":["A Client-Centric ASM-Based Approach to Identity Management in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Mircea Boris","family":"Vleju","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Brad, A.M.: New threats in cloud computing - with focus on identity and access management. Master\u2019s thesis, Johannes Kepler Universit\u00e4t Linz (July 2010)"},{"key":"5_CR2","unstructured":"Vleju, M.B.: New threats in cloud computing - with focus on cloud misuse and cloud vulnerabilities from the client side. Master\u2019s thesis, Johannes Kepler Universit\u00e4t Linz (July 2010)"},{"key":"5_CR3","unstructured":"Brunette, G., Mogull, R.: Security Guidance for critical areas of focus in Cloud Computing V2. 1. CSA (Cloud Security Alliance), USA (2009), \n                    \n                      http:\/\/www.cloudsecurityalliance.org\/guidance\/csaguide.v21"},{"key":"5_CR4","unstructured":"Fahmy, H.: New threats in cloud computing - ensuring proper connection and database forensics from the client side. Master\u2019s thesis, Johannes Kepler Universit\u00e4t Linz (July 2010)"},{"key":"5_CR5","unstructured":"Alp\u00e1r, G., Hoepman, J.H., Siljee, J.: The identity crisis. security, privacy and usability issues in identity management. CoRR abs\/1101.0427 (2011)"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Security Privacy\u00a06(2), 24\u201329 (2008)","journal-title":"IEEE Security Privacy"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Ahn, G.J., Ko, M., Shehab, M.: Privacy-enhanced user-centric identity management. In: IEEE International Conference on Communications, ICC 2009, pp. 1\u20135 (June 2009)","DOI":"10.1109\/ICC.2009.5199363"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Schechter, S., Dhamija, R., Ozment, A., Fischer, I.: The emperor\u2019s new security indicators. In: IEEE Symposium on Security and Privacy, SP 2007, pp. 51\u201365 (May 2007)","DOI":"10.1109\/SP.2007.35"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Chen, J.L.: Universal identity management model based on anonymous credentials. In: 2010 IEEE International Conference on Services Computing (SCC), pp. 305\u2013312 (July 2010)","DOI":"10.1109\/SCC.2010.46"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Alrodhan, W., Mitchell, C.: Addressing privacy issues in cardspace. In: Third International Symposium on Information Assurance and Security, IAS 2007, pp. 285\u2013291 (August 2007)","DOI":"10.1109\/ISIAS.2007.4299788"},{"key":"5_CR11","unstructured":"Oppliger, R., Gajek, S., Hauser, R.: Security of microsoft\u2019s identity metasystem and cardspace. In: Communication in Distributed Systems (KiVS), 2007 ITG-GI Conference, February 26 - March 2, pp. 1\u201312 (2007)"},{"key":"5_CR12","unstructured":"Cameron, K., Posch, R., Rannenberg, K.: Proposal for a Common Identity Framework: A User-Centric Identity Metasystem (2008)"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"B\u00f6rger, E., St\u00e4rk, R.F.: Abstract State Machines. A Method for High-Level System Design and Analysis. Springer (2003)","DOI":"10.1007\/978-3-642-18216-7"},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/MSP.2004.97","volume":"2","author":"D. Bakken","year":"2004","unstructured":"Bakken, D., Rarameswaran, R., Blough, D., Franz, A., Palmer, T.: Data obfuscation: anonymity and desensitization of usable data sets. IEEE Security Privacy\u00a02(6), 34\u201341 (2004)","journal-title":"IEEE Security Privacy"},{"key":"5_CR15","unstructured":"The Open Group Identity Management Work Area: Identity management. White Paper (March 2004)"}],"container-title":["Lecture Notes in Computer Science","Advances in Conceptual Modeling"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33999-8_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T08:40:14Z","timestamp":1620117614000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33999-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642339981","9783642339998"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33999-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}