{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,7]],"date-time":"2025-04-07T18:07:36Z","timestamp":1744049256252},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642545245"},{"type":"electronic","value":"9783642545252"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54525-2_36","type":"book-chapter","created":{"date-parts":[[2014,2,7]],"date-time":"2014-02-07T09:26:22Z","timestamp":1391765182000},"page":"404-415","source":"Crossref","is-referenced-by-count":3,"title":["Combining the X.509 and the SAML Federated Identity Management Systems"],"prefix":"10.1007","author":[{"given":"Marcus","family":"Hardt","sequence":"first","affiliation":[]},{"given":"Arsen","family":"Hayrapetyan","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Millar","sequence":"additional","affiliation":[]},{"given":"Shiraz","family":"Memon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","unstructured":"Unicore summit (2012), \n                    \n                      http:\/\/hdl.handle.net\/2128\/4705\n                    \n                    \n                   (last visited August 26, 2013)"},{"key":"36_CR2","unstructured":"DFN. The German National Research Network Provider, \n                    \n                      http:\/\/dfn.de\n                    \n                    \n                   (last visited June 1, 2013)"},{"key":"36_CR3","unstructured":"Shibboleth. Project homepage, \n                    \n                      http:\/\/shibboleth.net"},{"key":"36_CR4","unstructured":"The OpenSSL Team. OpenSSL project homepage, \n                    \n                      https:\/\/www.openssl.org\/\n                    \n                    \n                   (last visited October 10, 2012)"},{"key":"36_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/978-3-540-24689-3_5","volume-title":"Grid Computing","author":"R. Alfieri","year":"2004","unstructured":"Alfieri, R., Cecchini, R.L., Ciaschini, V., dell\u2019Agnello, L., Frohner, A., Gianoli, A., L\u00f5rentey, K., Spataro, F.: VOMS, an authorization system for virtual organizations. In: Fern\u00e1ndez Rivera, F., Bubak, M., G\u00f3mez Tato, A., Doallo, R. (eds.) Across Grids 2003. LNCS, vol.\u00a02970, pp. 33\u201340. Springer, Heidelberg (2004)"},{"key":"36_CR6","unstructured":"Benedyczak, K., Biala, P.: Next generation of virtual organizations in unicore. In: Unicore Summit 2012 Proceedings (2012)"},{"key":"36_CR7","unstructured":"Cantor, S., Josefsson, S.: SAML Enhanced Client SASL and GSS-API Mechanisms. IETF Draft Document (2013), \n                    \n                      https:\/\/datatracker.ietf.org\/doc\/draft-cantor-ietf-kitten-saml-ec\/\n                    \n                    \n                   (last visited November 13, 2013)"},{"key":"36_CR8","unstructured":"Cantor, S., Kemp, J., Philpott, R., Maler, E.: Assertions and protocols for the oasis security assertion markup language (SAML) v2.0 (2005)"},{"key":"36_CR9","unstructured":"eduGAIN. Project homepage, \n                    \n                      http:\/\/edugain.org"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Erwin, D., Snelling, D.: UNICORE: a grid computing environment. In: Euro-Par 2001 Parallel Processing, pp. 825\u2013834 (2001)","DOI":"10.1007\/3-540-44681-8_116"},{"key":"36_CR11","unstructured":"Farrell, S., Housley, R.: RFC 3281: An internet attribute certificate profile for authorization. IETF RFC, \n                    \n                      http:\/\/www.ietf.org\/rfc\/rfc3281.txt"},{"key":"36_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44681-8_1","volume-title":"Euro-Par 2001 Parallel Processing","author":"I. Foster","year":"2001","unstructured":"Foster, I.: The anatomy of the grid: Enabling scalable virtual organizations. In: Sakellariou, R., Keane, J.A., Gurd, J.R., Freeman, L. (eds.) Euro-Par 2001. LNCS, vol.\u00a02150, pp. 1\u20134. Springer, Heidelberg (2001)"},{"key":"36_CR13","unstructured":"Howlett, J., Hartman, S.: Application Bridging for Federated Access Beyond web (ABFAB). IETF Draft, \n                    \n                      http:\/\/datatracker.ietf.org\/wg\/abfab\/"},{"key":"36_CR14","unstructured":"ITU-T Study Group 17: Security. In: Public-key and attribute certificate frameworks (October 2010), \n                    \n                      http:\/\/www.itu.int\/ITU-T\/recommendations\/rec.aspx?rec=X.509\n                    \n                    \n                   (last visisted August 22, 2013)"},{"key":"36_CR15","unstructured":"Murri, R., Maffioletti, S., Kunszt, P., Tschopp, V.: Gridcertlib: a single sign-on solution for grid web applications and portals, \n                    \n                      http:\/\/arxiv.org\/abs\/1101.4116v3"},{"key":"36_CR16","unstructured":"The GridShib Project. Homepage, \n                    \n                      http:\/\/gridshib.globus.org\n                    \n                    \n                   (last visited August 26, 2013)"},{"key":"36_CR17","unstructured":"The International Grid Trust Federation, \n                    \n                      http:\/\/www.igtf.net\n                    \n                    \n                   (last visited June 12, 2013)"},{"key":"36_CR18","unstructured":"The Switch AAI. Homepage, \n                    \n                      http:\/\/www.switch.ch\/aai\/\n                    \n                    \n                   (last visited August 26, 2013)"},{"key":"36_CR19","unstructured":"van Wezel, J., Streit, A., Jung, C., Stotzka, R., Halstenberg, S., Rigoll, F., Garcia, A., Heiss, A., Schwarz, K., Gasthuber, M., Giesler, A.: Data life cycle labs, a new concept to support data-intensive science. arXiv e-print 1212.5596 (December 2012)"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54525-2_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T02:01:45Z","timestamp":1558836105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54525-2_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642545245","9783642545252"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54525-2_36","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}