{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:38:22Z","timestamp":1743097102256,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":5,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"license":[{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2009,12,12]],"date-time":"2009-12-12T00:00:00Z","timestamp":1260576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_11","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"65-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Authentication Information Alignment for Cross-Domain Federations"],"prefix":"10.1007","author":[{"given":"Zhengping","family":"Wu","sequence":"first","affiliation":[]},{"given":"Alfred C.","family":"Weaver","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"issue":"5","key":"11_CR1","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10207-007-0027-9","volume":"6","author":"Z. Wu","year":"2007","unstructured":"Z. Wu, A.C. Weaver, \u201cRequirements of federated trust management for service-oriented architectures,\u201d International Journal of Information Security, Vol. 6(5), 2007, pp. 287 \u2013 296.","journal-title":"International Journal of Information Security"},{"issue":"3","key":"11_CR2","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1108\/17410390710740727","volume":"20","author":"P. Beynon-Davies","year":"2007","unstructured":"P. Beynon-Davies, \u201cPersonal identity management and electronic government,\u201d Journal of Enterprise Information Management, Vol. 20(3), 2007, pp. 244 \u2013 270.","journal-title":"Journal of Enterprise Information Management"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"J. Wayman, A. Jain, D. Maltoni, and D. Maio, Biometric Systems: Technology, Design and Performance Evaluation, Springer, 2005.","DOI":"10.1007\/b138151"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"P. S. Addison, The Illustrated Wavelet Transform Handbook, Institute of Physics Publishing, 2002.","DOI":"10.1887\/0750306920"},{"key":"11_CR5","unstructured":"The BioAPI Consortium, \u201cthe BioAPI 2.0 standard,\u201d ISO\/IEC 19784, 2005."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T11:05:39Z","timestamp":1675249539000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_11","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]},"assertion":[{"value":"12 December 2009","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}