{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T05:32:50Z","timestamp":1725687170244},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304354"},{"type":"electronic","value":"9783642304361"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30436-1_6","type":"book-chapter","created":{"date-parts":[[2012,6,5]],"date-time":"2012-06-05T16:20:29Z","timestamp":1338913229000},"page":"61-74","source":"Crossref","is-referenced-by-count":7,"title":["OFELIA \u2013 A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management"],"prefix":"10.1007","author":[{"given":"Alexandre B.","family":"Augusto","sequence":"first","affiliation":[]},{"given":"Manuel Eduardo","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1594977.1592585","volume":"39","author":"R. Baden","year":"2009","unstructured":"Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. SIGCOMM Comput. Commun. Rev.\u00a039, 135\u2013146 (2009)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"6_CR2","unstructured":"Cantor, S.: Shibboleth architecture, protocols and profiles (September 2005), http:\/\/www.mediafire.com\/?8bswqc4y47sqygw (verified on January 13, 2012)"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Chadwick, D.: Authorisation using attributes from multiple authorities. In: 15th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, WETICE 2006, pp. 326\u2013331. IEEE (2006)","DOI":"10.1109\/WETICE.2006.22"},{"key":"6_CR4","unstructured":"Chadwick, D., Inman, G., and Klingenstein, N. Authorisation using attributes from multiple authorities\u2013a study of requirements. European Institute for E-Learning (EIfEL), 366 (2007)"},{"issue":"7","key":"6_CR5","doi-asserted-by":"publisher","first-page":"1043","DOI":"10.1016\/j.future.2009.12.004","volume":"26","author":"D.W. Chadwick","year":"2010","unstructured":"Chadwick, D.W., Inman, G., Klingenstein, N.: A conceptual model for attribute aggregation. Future Generation Computer Systems\u00a026(7), 1043\u20131052 (2010)","journal-title":"Future Generation Computer Systems"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Eastlake III, D., Crocker, S., Schiller, J.: Randomness recommendations for security (2005), https:\/\/ietf.org\/rfc\/rfc4086.txt (verified on February 14, 2012)","DOI":"10.17487\/rfc4086"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Saint-Andre, P. (ed.): Extensible messaging and presence protocol (xmpp):core. RFC 3920, IETF (July 2004)","DOI":"10.17487\/rfc3920"},{"key":"6_CR8","unstructured":"For Android, P.S. Secure element evaluation kit for the android platform - the \u2019smartcard api\u2019 (2011), http:\/\/tinyurl.com\/seek4android (verified on January 10, 2012)"},{"key":"6_CR9","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1002\/cpe.1350","volume":"21","author":"J. Gemmill","year":"2009","unstructured":"Gemmill, J., Robinson, J.-P., Scavo, T., Bangalore, P.: Cross-domain authorization for federated virtual organizations using the myvocs collaboration environment. Concurr. Comput.: Pract. Exper.\u00a021, 509\u2013532 (2009)","journal-title":"Concurr. Comput.: Pract. Exper."},{"key":"6_CR10","unstructured":"GmbH, G.. D. S. F.S. Mobile security card ve 2.0 (2011), http:\/\/tinyurl.com\/mobseccard (verified on January 10, 2012)"},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"779","DOI":"10.1109\/TCE.2011.5955222","volume":"57","author":"H. Huang","year":"2011","unstructured":"Huang, H.: Reversible data hiding with histogram-based difference expansion for qr code applications. IEEE Transactions on Consumer Electronics\u00a057(2), 779\u2013787 (2011)","journal-title":"IEEE Transactions on Consumer Electronics"},{"key":"6_CR12","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1145\/1542084.1542094","volume-title":"Proceedings of the Seventh European Conference on European Interactive Television Conference, EuroITV 2009","author":"T. Haaker","year":"2009","unstructured":"Haaker, T., Smit, S., Vester, J., Shepherd, K., Ito, N., Guelbahar, M., Zoric, J.: Business models for networked media services. In: Proceedings of the Seventh European Conference on European Interactive Television Conference, EuroITV 2009, pp. 53\u201356. ACM, New York (2009)"},{"key":"6_CR13","unstructured":"Hammer-Lahav, E.: Introducing oauth 2.0 (2010)"},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Hammer-Lahav, E.: The oauth 1.0 protocol (rfc5849) (April 2010), http:\/\/tools.ietf.org\/html\/rfc5849 (verified on April 14, 2011)","DOI":"10.17487\/rfc5849"},{"key":"6_CR15","unstructured":"Ian\u00a0Paterson, P. S.-A.: Xep-0206: Xmpp over bosh (July 2010), http:\/\/bit.ly\/xep0206 (verified on April 14, 2011)"},{"key":"6_CR16","unstructured":"Inman, G., Chadwick, D.: A privacy preserving attribute aggregation model for federated identity managements systems. Serbian Publication InfoReview joins UPENET, the Network of CEPIS Societies Journals and Magazines\u00a021 (2010)"},{"key":"6_CR17","unstructured":"Jsang, A., Pope, S.: User-centric identity management. In: Proceedings of AusCERT 2005, Brisbane, Australia (May 2005)"},{"key":"6_CR18","unstructured":"Sakimura, N., et al.: Openid connect standard 1.0, http:\/\/tinyurl.com\/openidc (verified on January 13, 2012)"},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1179529.1179532","volume-title":"Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006","author":"D. Recordon","year":"2006","unstructured":"Recordon, D., Reed, D.: Openid 2.0: a platform for user-centric identity management. In: Proceedings of the Second ACM Workshop on Digital Identity Management, DIM 2006, pp. 11\u201316. ACM, New York (2006)"},{"key":"6_CR20","unstructured":"Saint-Andr\u00e9, P., Smith, K., Tron\u00e7on, R.: XMPP: the definitive guide. Definitive Guide Series. O\u2019Reilly (2009)"},{"key":"6_CR21","unstructured":"Schwartz, P.\u00a0M.: Property, Privacy, and Personal Data. SSRN eLibrary"},{"key":"6_CR22","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1002\/asi.10213","volume":"54","author":"D. Song","year":"2003","unstructured":"Song, D., Bruza, P.: Towards context sensitive information inference. Journal of the American Society for Information Science and Technology, IETF\u00a054, 321\u2013334 (2003)","journal-title":"Journal of the American Society for Information Science and Technology, IETF"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security and Privacy Research"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30436-1_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,16]],"date-time":"2022-01-16T18:20:52Z","timestamp":1642357252000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30436-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304354","9783642304361"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30436-1_6","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1861-2288"}],"subject":[],"published":{"date-parts":[[2012]]}}}