{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:35:06Z","timestamp":1725528906183},"publisher-location":"Wiesbaden","reference-count":22,"publisher":"Vieweg+Teubner","isbn-type":[{"type":"print","value":"9783834806604"},{"type":"electronic","value":"9783834892836"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-8348-9283-6_3","type":"book-chapter","created":{"date-parts":[[2009,3,6]],"date-time":"2009-03-06T16:17:39Z","timestamp":1236356259000},"page":"30-38","source":"Crossref","is-referenced-by-count":0,"title":["Quantified Trust Levels for Authentication"],"prefix":"10.1007","author":[{"given":"Ivonne","family":"Thomas","sequence":"first","affiliation":[]},{"given":"Michael","family":"Menzel","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Australian Government Authentication Framework for Individuals. http:\/\/www.agimo.gov.au\/infrastructure\/authentication\/, 2008."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"J. Burnes and W. Chang: An intrinsic assessment and comparison of biometric systems through wavelet analysis. In: IEEE International Conference on Systems, Man and Cybernetics, Jan 2003.","DOI":"10.1109\/ICSMC.2003.1245695"},{"key":"3_CR3","unstructured":"e-Authentication Initiative, US: E-Authentication Guidance for Federal Agencies. http:\/\/www.whitehouse.gov\/omb\/memoranda\/fy04\/m04-04.pdf."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"J. Galbally-Herrero and J. Fierrez-Aguilar: On the vulnerability of fingerprint verification systems to fake fingerprints attacks. In: Carnahan Conferences Security Technology, Jan 2006.","DOI":"10.1109\/CCST.2006.313441"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"E. Gehringer: Choosing passwords: security and human factors. In: Technology and Society, Jan 2002.","DOI":"10.1109\/ISTAS.2002.1013839"},{"key":"3_CR6","unstructured":"IDABC \u2014 Interoperable Delivery of European eGovernment Services to public Administrations, Businesses and Citizens. http:\/\/europa.eu.int\/idabc\/, 2007."},{"key":"3_CR7","unstructured":"J. Jeff, Y. Alan, B. Ross, and A. Alasdair: The Memorability and Security of Passwords: Some Empirical Results. In: Technical Report No. 500, Computer Laboratory, University of Cambridge, Jan 2000."},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"H. Kim, J. Oh, and J. Choi: Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. In: Proceedings of the 30th Annual International Computer Software and Applications Conference, Jan 2006.","DOI":"10.1109\/COMPSAC.2006.158"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"A. Kong, D. Zhang, and M. Kamel: Analysis of Brute-Force Break-Ins of a Palmprint Authentication System. In: IEEE Transactions on Systems, Man and Cybernetics, Jan 2006.","DOI":"10.1109\/TSMCB.2006.876168"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"A. Kong, D. Zhang, and M. Kamel: Three measures for secure palmprint identification. In: Pattern Recognition, Jan 2008.","DOI":"10.1016\/j.patcog.2007.09.002"},{"key":"3_CR11","unstructured":"KWINT Project. A safer internet for all. http:\/\/www.ecp.nl\/downloads\/id=43\/download.html, 2007."},{"key":"3_CR12","unstructured":"The Liberty Alliance Project. In: http:\/\/www.projectliberty.org, 2007."},{"key":"3_CR13","unstructured":"D. Nali and J. Thorpe: Analyzing User Choice in Graphical Passwords. In: Technical Report, 2004."},{"key":"3_CR14","unstructured":"National Institute of Standards (NIST): Fingerprint Vendor Technology Evaluation (FpVTE), 2003."},{"key":"3_CR15","unstructured":"E-government in New Zealand. http:\/\/www.e.govt.nz, 2008."},{"key":"3_CR16","unstructured":"OASIS: Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.02. In: OASIS Standard Specification, March 2005."},{"key":"3_CR17","unstructured":"OASIS: Security Assertion Markup Language (SAML) V2.0. In: OASIS Standard Specification, March 2005."},{"key":"3_CR18","unstructured":"Office of the e-Envoy, UK. Registration and Authentication \u2014 e-Government Strategy Framework Policy and Guidelines. http:\/\/www.cabinetoffice.gov.uk\/csia\/documents\/pdf\/RegAndAuthentn0209v3.pdf, 2002."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"S. Prabhakar, S. Pankanti, and A. Jain: Biometric recognition: security and privacy concerns. In: Security and Privacy Magazine, Jan 2003.","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"R. Sampath and D. Goel. RATING: Rigorous Assessment of Trust in Identity Management. RES 2006. The First International Conference on Availability, Reliability and Security, pages 14\u201323, 2006.","DOI":"10.1109\/ARES.2006.103"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Z. Wu and A. C. Weaver. Requirements of federated trust management for service-oriented architectures. International Journal of Information Security, Jan 2007.","DOI":"10.1007\/s10207-007-0027-9"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"M. Zviran and W. Haga: Password security: an empirical study. In: Journal of Management Information Systems, Jan 1999.","DOI":"10.1080\/07421222.1999.11518226"}],"container-title":["ISSE 2008 Securing Electronic Business Processes"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-8348-9283-6_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T12:22:53Z","timestamp":1606134173000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-8348-9283-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783834806604","9783834892836"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-8348-9283-6_3","relation":{},"subject":[]}}