{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T21:21:06Z","timestamp":1648848066045},"reference-count":10,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2008,11,28]],"date-time":"2008-11-28T00:00:00Z","timestamp":1227830400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2009,4]]},"DOI":"10.1007\/s10207-008-0065-y","type":"journal-article","created":{"date-parts":[[2008,11,27]],"date-time":"2008-11-27T07:12:04Z","timestamp":1227769924000},"page":"77-87","source":"Crossref","is-referenced-by-count":2,"title":["Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture"],"prefix":"10.1007","volume":"8","author":[{"given":"Kalid","family":"Elmufti","sequence":"first","affiliation":[]},{"given":"Dasun","family":"Weerasinghe","sequence":"additional","affiliation":[]},{"given":"M.","family":"Rajarajan","sequence":"additional","affiliation":[]},{"given":"Veselin","family":"Rakocevic","sequence":"additional","affiliation":[]},{"given":"Sanowar","family":"Khan","sequence":"additional","affiliation":[]},{"given":"John A.","family":"MacDonald","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,28]]},"reference":[{"key":"65_CR1","unstructured":"Access to network application functions using hypertext transfer protocol over transport layer security. Technical report, ETSI European Telecommunications Standards Institution, June 2005. UMTS, Generic Authentication Architecture (2005)"},{"key":"65_CR2","unstructured":"Generic bootstrapping architecture. Technical report, ETSI European Telecommunications Standards Institution, June 2005. UMTS, Generic Authentication Architecture (2005)"},{"key":"65_CR3","unstructured":"Interworking of Liberty Alliance ID-FF, ID-WSF and Generic Authentication Architecture. Technical report, 3GPP 3rd Generation Partnership Project, July 2005. 3GPP TR 33.980; Technical Specification Group Services and System Aspect, Release 4 (2005)"},{"key":"65_CR4","unstructured":"SAML V2.0 Executive Overview. Technical report, OASIS, April 2005. OASIS Standard (2005)"},{"key":"65_CR5","volume-title":"MIDP 2.0 Style Guide","author":"C. Block","year":"2003","unstructured":"Block C., Wagner A.C.: MIDP 2.0 Style Guide. Addison-Wesley, London (2003)"},{"key":"65_CR6","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/0263-2373(90)90054-A","volume":"8","author":"R. Ford","year":"1990","unstructured":"Ford R.: Managing retail service businesses for the 1990s: Marketing aspects. Eur. Manage. J. 8, 58\u201366 (1990)","journal-title":"Eur. Manage. J."},{"key":"65_CR7","unstructured":"Krishna, S.: Web Services Framework and Assertion exchange using SAML. W3C, http:\/\/www.w3.org (2001)"},{"key":"65_CR8","doi-asserted-by":"crossref","unstructured":"MacDonald, J.A., Sirett, W.G., Mitchell, C.J.: Overcoming channel bandwidth constraints in secure SIM applications. In: Security and Privacy in the Age of Ubiquitous Computing. Springer Science and Business Media (2005)","DOI":"10.1007\/0-387-25660-1_35"},{"key":"65_CR9","volume-title":"Programming Web Services with SOAP","author":"J. Snell","year":"2002","unstructured":"Snell J., Tidwell D., Kulchenko P.: Programming Web Services with SOAP. O\u2019Reilly, Cambridge (2002)"},{"key":"65_CR10","unstructured":"Sun Microsystems, http:\/\/java.sun.com\/products . Wireless Toolkit, Version 2.1 (2003)"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0065-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-008-0065-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-008-0065-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T11:01:23Z","timestamp":1559127683000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-008-0065-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,28]]},"references-count":10,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,4]]}},"alternative-id":["65"],"URL":"https:\/\/doi.org\/10.1007\/s10207-008-0065-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,28]]}}}