{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T00:39:42Z","timestamp":1743122382847,"version":"3.40.3"},"publisher-location":"Wiesbaden","reference-count":7,"publisher":"Springer Fachmedien Wiesbaden","isbn-type":[{"type":"print","value":"9783658003326"},{"type":"electronic","value":"9783658003333"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-658-00333-3_19","type":"book-chapter","created":{"date-parts":[[2012,12,10]],"date-time":"2012-12-10T06:34:49Z","timestamp":1355121289000},"page":"195-206","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Strong Authentication of Humans and Machines in Policy Controlled Cloud Computing Environment Using Automatic Cyber Identity"],"prefix":"10.1007","author":[{"given":"Libor","family":"Neumann","sequence":"first","affiliation":[]},{"given":"Tom\u00e1\u0161","family":"Halman","sequence":"additional","affiliation":[]},{"given":"Pavel","family":"Rotek","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Boettcher","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Stecklina","sequence":"additional","affiliation":[]},{"given":"Michal","family":"Sojka","sequence":"additional","affiliation":[]},{"given":"David","family":"N\u00fa\u00f1ez","sequence":"additional","affiliation":[]},{"given":"Isaac","family":"Agudo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,11]]},"reference":[{"key":"19_CR44","unstructured":"Allan, Ant: Strategic Planning Assumption: By year-end 2013, fewer than 10% of all authentication events will involve discrete, specialised authentication hardware of any kind. In: Identity and Access Management \u2013 Research Highlights, Gartner Corporate Marketing, 2011"},{"key":"19_CR45","unstructured":"Neumann, Libor: An analysis of e-identity organizational and technological solutions within a single European information space. In: e-Challenges e-2007, The Hague, Netherlands, 2007, pp. 1326-1333."},{"key":"19_CR46","unstructured":"[Neum08] Neumann, Libor: Anonymous, Liberal, and User-Centric Electronic Identity \u2013 A New, Systematic Design of eID Infrastructure, In: e-Challenges e-2008, 22-24 October 2008, Stockholm, Sweden."},{"key":"19_CR47","unstructured":"Neumann, Libor: ALUCID (Automatic Liberal and User Centric electronic Identity) and Its Integration. Retrieved from http:\/\/www.alucid.eu\/en\/download\/"},{"key":"19_CR48","unstructured":"Neumann, Libor: Cyber Identity is NOT Human Identity \u2013 A System Weaknesses Analysis of Current eID Technologies. In: EEMA eIdentity Management Conference, 12 June 2012, Paris, France"},{"key":"19_CR49","unstructured":"PASSIVE: D3.2.1 Interim PASSIVE Architecture"},{"key":"19_CR50","unstructured":"PASSIVE: D6.2.2. \u2013 Standardisation and Exploitation Report"}],"container-title":["ISSE 2012 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-658-00333-3_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,19]],"date-time":"2023-02-19T07:00:50Z","timestamp":1676790050000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-658-00333-3_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783658003326","9783658003333"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/978-3-658-00333-3_19","relation":{},"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"11 December 2012","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}