{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,2]],"date-time":"2023-09-02T22:27:30Z","timestamp":1693693650379},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2011,7,7]],"date-time":"2011-07-07T00:00:00Z","timestamp":1309996800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s10207-011-0140-7","type":"journal-article","created":{"date-parts":[[2011,7,6]],"date-time":"2011-07-06T13:01:20Z","timestamp":1309957280000},"page":"351-372","source":"Crossref","is-referenced-by-count":4,"title":["Solving identity delegation problem in the e-government environment"],"prefix":"10.1007","volume":"10","author":[{"given":"Sergio","family":"S\u00e1nchez Garc\u00eda","sequence":"first","affiliation":[]},{"given":"Ana","family":"G\u00f3mez Oliva","sequence":"additional","affiliation":[]},{"given":"Emilia","family":"P\u00e9rez Belleboni","sequence":"additional","affiliation":[]},{"given":"Iv\u00e1n","family":"Pau de la Cruz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,7,7]]},"reference":[{"key":"140_CR1","unstructured":"Decision 2004\/387\/EC of the European Parliament and of the Council of 21 April 2004 on the interoperable delivery of pan-European eGovernment services to public administrations, businesses and citizens (IDABC). Off. J. Eur. Union Luxembourg, L 181, 25\u201335 (18 May 2004)"},{"key":"140_CR2","unstructured":"Communication from the Commission to the Council, the European Parliament, the Ecomnomic and Social Commitee and The Comittee of Regions\u2014eEurope 2005: An information society for all [COM(2002) 263 final]. Brussels (28 May 2002)"},{"key":"140_CR3","unstructured":"Communities, Commission of the European. Communication from the Commission to the Council, the European Parliament, the European Economic and Social Committee and the Committee of the Regions. i2010 eGovernment Action Plan: Accelerating eGovernment in Europe for the Benefit of All. (25 Apr 2006). http:\/\/ec.europa.eu\/idabc\/servlets\/Doc?id=25286"},{"key":"140_CR4","unstructured":"General, European Commission Information Society and Media Directorate. Signpost towards eGovernment 2010. (Nov 2005)"},{"key":"140_CR5","unstructured":"AAVV: A Roadmap for a pan-European eIDM Framework by 2010. Version 1.0. http:\/\/ec.europa.eu\/information_society\/activities\/egovernment\/docs\/pdf\/eidm_roadmap_paper.pdf . Accessed Aug 2010"},{"key":"140_CR6","unstructured":"Graux, H., Dumortier, J.: Report on the State of Pan-European eID Initiatives. Technical Department, ENISA (2009)"},{"key":"140_CR7","unstructured":"Team, The Modinis IDM Study: Modinis Study on Identity Management in eGovernment: Common Terminological Framework for Interoperable Electronic Identity Management. Version 2.01. (23 Nov de 2005). http:\/\/www.cosic.esat.kuleuven.be\/modinis-idm\/twiki\/bin\/view.cgi\/Main\/GlossaryDoc . Accessed Aug 2010"},{"key":"140_CR8","unstructured":"Brmme, A., Busch, C., Hhnlein, D.: Cross-Context Delegation through Identity Federation. In: Peeters, R., et\u00a0al. (eds.) Proceedings of the Special Interest Group on Biometrics and Electronic Signatures. Vols. Lecture Notes in Informatics (LNI) P-137. Bonner Kllen Verlag, pp. 79\u201392 (2008)"},{"key":"140_CR9","unstructured":"Alrodhan, W., Mitchell, C. J.: A delegation Framework for Liberty. In: Proceedings of the 3rd Conference on Advances in Computer Security and Forensics (ACSF\u201908). Liverpool John Moores University, Liverpool, pp. 67\u201373 (2008)"},{"key":"140_CR10","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"2006","unstructured":"Sandhu R. et\u00a0al.: Role-based access control models. IEEE Comput. 29, 38\u201347 (2006)","journal-title":"IEEE Comput."},{"key":"140_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, L., Ahn, G., Chu, B.: A rule-based framework for role-based delegation. In: Proceedings of the Sixth ACM Symposium on Access Control Models and Technologies. pp. 153\u2013162 (2001)","DOI":"10.1145\/373256.373289"},{"key":"140_CR12","unstructured":"Welch, V., et\u00a0al.: X.509 Proxy Certificates for Dynamic Delegation. 3rd Annual PKI R&D Workshop (2004)"},{"key":"140_CR13","doi-asserted-by":"crossref","unstructured":"Gomi, H., et\u00a0al.: A delegation framework for federated identity management. In: Proceedings of the 2005 Workshop on Digital identity management. Fairfax, VA, USA (2005)","DOI":"10.1145\/1102486.1102502"},{"key":"140_CR14","doi-asserted-by":"crossref","unstructured":"Farrell, S., Housley, R.: An Internet Attribute Certificate Profile for Authorization. IETF RFC 3281 (2002)","DOI":"10.17487\/rfc3281"},{"key":"140_CR15","unstructured":"Liberty Alliance Project. http:\/\/www.projectliberty.org . Accessed Aug 2010"},{"key":"140_CR16","doi-asserted-by":"crossref","unstructured":"Komura, T., et\u00a0al.: Proposal of delegation using electronic certificates on single sign-on system with SAML-protocol. SAINT\u201909. Ninth Annual International Symposium on Applications and the Internet (2009)","DOI":"10.1109\/SAINT.2009.53"},{"key":"140_CR17","doi-asserted-by":"crossref","unstructured":"Tuecke, S., et\u00a0al.: Internet X.509 Public Key Infrastructure (PKI) Proxy Certificate Profile. IETF RFC 3820 (2004)","DOI":"10.17487\/rfc3820"},{"key":"140_CR18","unstructured":"Ragouzis, N., et\u00a0al.: Security Assertion Markup Language (SAML) V2.0 Technical Overview. http:\/\/docs.oasis-open.org\/security\/saml\/Post2.0\/sstc-saml-tech-overview-2.0.pdf . v16. (2008), Accessed June 2010"},{"key":"140_CR19","doi-asserted-by":"crossref","unstructured":"Housley, R., et\u00a0al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 3280 (2002)","DOI":"10.17487\/rfc3280"},{"key":"140_CR20","doi-asserted-by":"crossref","unstructured":"Cooper, D., et\u00a0al.: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. IETF RFC 5280 (2008)","DOI":"10.17487\/rfc5280"},{"key":"140_CR21","doi-asserted-by":"crossref","unstructured":"Myers, M., et\u00a0al.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol\u2014OCSP. IETF RFC 2560 (1999)","DOI":"10.17487\/rfc2560"},{"key":"140_CR22","unstructured":"OASIS: SAML. Online Community for the Security Assertion Markup Language (SAML) OASIS Standard. http:\/\/saml.xml.org\/saml-specifications . Accessed June 2010"},{"key":"140_CR23","unstructured":"Maler, E., Mishra, P., Philpott, R.: Assertions and Protocol for the OASIS Security Assertion Markup Language (SAML) V1.1. http:\/\/www.oasis-open.org\/committees\/download.php\/3406\/oasis-sstc-saml-core-1.1.pdf . Accessed June 2010"},{"key":"140_CR24","unstructured":"OASIS: OASIS Security Services Technical Committee. http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=security . Accessed June 2010"},{"key":"140_CR25","unstructured":"OASIS: Organization for the Advancement of Structured Information Standards. http:\/\/www.oasis-open.org\/home\/index.php . Accessed June 2010"},{"key":"140_CR26","unstructured":"GridShib: http:\/\/gridshib.globus.org\/ . Accessed June 2010"},{"key":"140_CR27","unstructured":"VVAA: An X.509 Binding for SAML. http:\/\/spaces.internet2.edu\/display\/GS\/X509BindingSAML"},{"key":"140_CR28","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R., Masinter, L.: Uniform Resource Identifier (URI): Generic Syntax. IETF RFC 3986 (2005)","DOI":"10.17487\/rfc3986"},{"key":"140_CR29","unstructured":"Web Services Addressing 1.0\u2014Core: W3C Recommendation. http:\/\/www.w3.org\/TR\/2006\/REC-ws-addr-core-20060509 . Accessed May 2010"},{"key":"140_CR30","doi-asserted-by":"crossref","unstructured":"Duerst, M., Suignard, M.: Internationalized Resource Identifiers (IRIs). IETF RFC 3987 (2005)","DOI":"10.17487\/rfc3987"},{"key":"140_CR31","unstructured":"Federal Information Processing Standards Publication (FIPS PUB) 180-2. Secure Hash Standard (2002)"},{"key":"140_CR32","doi-asserted-by":"crossref","unstructured":"Myers, M., et\u00a0al.: X.509 Internet Public Key Infrastructure Online Certificate Status Protocol\u2014OCSP. IETF RFC 2560 (1999)","DOI":"10.17487\/rfc2560"},{"key":"140_CR33","unstructured":"Oracle Corporation: Java. http:\/\/java.sun.com\/ . Accessed June 2010"},{"key":"140_CR34","unstructured":"Java SE Downloads: http:\/\/java.sun.com\/javase\/downloads\/widget\/jdk6.jsp . Accessed June 2010"},{"key":"140_CR35","unstructured":"Oracle Corporation: Netbeans IDE. http:\/\/netbeans.org\/ . Accessed June 2010"},{"key":"140_CR36","unstructured":"The Apache Software Foundation: Apache Tomcat. http:\/\/tomcat.apache.org\/ . Accessed June 2010"},{"key":"140_CR37","unstructured":"The Legion of the Bouncycastle. Bouncy Castle Crypto APIs for Java. http:\/\/www.bouncycastle.org\/java.html . Accessed June 2010"},{"key":"140_CR38","unstructured":"University of Chicago. Globus Toolkit. http:\/\/www.globus.org\/toolkit\/ . Accessed June 2010"},{"key":"140_CR39","unstructured":"Board of Trustees of the University of Illinois. GridShib. http:\/\/gridshib.globus.org\/ . Accessed June 2010"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-011-0140-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-011-0140-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-011-0140-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T19:52:42Z","timestamp":1560369162000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-011-0140-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,7]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["140"],"URL":"https:\/\/doi.org\/10.1007\/s10207-011-0140-7","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,7,7]]}}}