{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T16:38:09Z","timestamp":1758818289359,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"7-8","license":[{"start":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T00:00:00Z","timestamp":1498262400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s12243-017-0587-2","type":"journal-article","created":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T17:37:51Z","timestamp":1498325871000},"page":"459-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Cross-domain identity and discovery framework for web calling services"],"prefix":"10.1007","volume":"72","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7030-5200","authenticated-orcid":false,"given":"Ibrahim Tariq","family":"Javed","sequence":"first","affiliation":[]},{"given":"Rebecca","family":"Copeland","sequence":"additional","affiliation":[]},{"given":"Noel","family":"Crespi","sequence":"additional","affiliation":[]},{"given":"Marc","family":"Emmelmann","sequence":"additional","affiliation":[]},{"given":"Ancuta","family":"Corici","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Bouabdallah","sequence":"additional","affiliation":[]},{"given":"Tuo","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Saad","family":"El Jaouhari","sequence":"additional","affiliation":[]},{"given":"Felix","family":"Beierle","sequence":"additional","affiliation":[]},{"given":"Sebastian","family":"G\u00f6nd\u00f6r","sequence":"additional","affiliation":[]},{"given":"Axel","family":"K\u00fcpper","sequence":"additional","affiliation":[]},{"given":"Kevin","family":"Corre","sequence":"additional","affiliation":[]},{"given":"Jean-Michel","family":"Crom","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Oberle","sequence":"additional","affiliation":[]},{"given":"Ingo","family":"Friese","sequence":"additional","affiliation":[]},{"given":"Ana","family":"Caldeira","sequence":"additional","affiliation":[]},{"given":"Gil","family":"Dias","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Chaves","sequence":"additional","affiliation":[]},{"given":"Ricardo Lopes","family":"Pereira","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,24]]},"reference":[{"key":"587_CR1","unstructured":"A Bergkvist, Burnett DC, Jennings C (2015) WebRTC 1.0: real-time communication between browsers, W3C Working Draft, 10 February"},{"issue":"6","key":"587_CR2","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1109\/MIC.2014.106","volume":"18","author":"R Barnes","year":"2014","unstructured":"Barnes R, Thomson M (2014) Browser-to-browser security assurances for WebRTC. IEEE Internet Comput 18(6):11\u201317","journal-title":"IEEE Internet Comput"},{"key":"587_CR3","doi-asserted-by":"crossref","unstructured":"E Bertin, S Cubaud, S Tuffin, N Crespi, V Beltran (2013) WebRTC, the day after: what\u2019s next for conversational services? International Conference on Intelligence in Next Generation Networks (ICIN 2013)","DOI":"10.1109\/ICIN.2013.6670893"},{"key":"587_CR4","unstructured":"I Javed et al. (2016) Global identity and reachability framework for interoperable P2P communication services, 19th Conference on Innovations in Clouds, Internet and Networks (ICIN 2016)"},{"key":"587_CR5","doi-asserted-by":"crossref","unstructured":"S Becot, E Bertin, J Crom, V Frey, S Tuffin (2015) Communication services in the Web era: how can Telco join the OTT hangout?, International Conference on Intelligence in Next Generation Networks (ICIN 2015)","DOI":"10.1109\/ICIN.2015.7073833"},{"key":"587_CR6","first-page":"1","volume-title":"Introducing a cross federation identity solution for converged network environments, principles, systems and applications of IP Telecommunications (IPTComm \u201810)","author":"K Lampropoulos","year":"2010","unstructured":"Lampropoulos K, Sanchez D, Almenares F, Weik P, Denazis S (2010) Introducing a cross federation identity solution for converged network environments, principles, systems and applications of IP Telecommunications (IPTComm \u201810). ACM, New York, pp 1\u201311"},{"issue":"7","key":"587_CR7","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCOM.2016.7514160","volume":"54","author":"V Beltran","year":"2016","unstructured":"Beltran V (2016) Characterization of web single sign-on protocols. IEEE Commun Mag 54(7):24\u201330","journal-title":"IEEE Commun Mag"},{"key":"587_CR8","unstructured":"M Jones and D Hardt (2012) The OAuth 2.0 authorization framework: bearer token usage, IETF RFC6750"},{"key":"587_CR9","unstructured":"N Sakimura, J Bradley, M Jones, B Medeiros, C Mortimore (2014) OpenID connect Core 1.0, The OpenID Foundation"},{"key":"587_CR10","unstructured":"E Rescorla (2016) WebRTC security architecture, IETF internet draft, standards track"},{"issue":"6","key":"587_CR11","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/MIC.2014.128","volume":"18","author":"V Beltran","year":"2014","unstructured":"Beltran V, Bertin E, Crespi N (2014) User identity for WebRTC services: a matter of trust. IEEE Internet Comput 18(6):18\u201325","journal-title":"IEEE Internet Comput"},{"key":"587_CR12","volume-title":"Converging NGN wireline and mobile 3G networks with IMS","author":"R Copeland","year":"2009","unstructured":"R Copeland (2009) Converging NGN wireline and mobile 3G networks with IMS. CRC Press, Talor & Francis Group, Boca Raton"},{"key":"587_CR13","doi-asserted-by":"crossref","unstructured":"L Li, W Chou, T Cai, Z Wang, Z Qiu Mirror presence: secure web identity resolution and call control for WebRTC, Proceedings of International Conference on Information Integration and Web-based Applications & Services (IIWAS 2013) ACM, New York, pp 523\u2013532","DOI":"10.1145\/2539150.2539165"},{"key":"587_CR14","doi-asserted-by":"crossref","unstructured":"S G\u00f6nd\u00f6r, H Hebbo (2014) SONIC: Towards seamless interaction in heterogeneous distributed OSN ecosystems, IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob), Larnaca","DOI":"10.1109\/WiMOB.2014.6962203"},{"issue":"12","key":"587_CR15","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"L Cutillo","year":"2009","unstructured":"Cutillo L, Molva R, Strufe T (2009) Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun Mag 47(12):94\u2013101","journal-title":"IEEE Commun Mag"},{"key":"587_CR16","unstructured":"A Bouabdallah Data models and interface specification of the framework, reTHINK project Deliverable. http:\/\/dx.doi.org\/10.18153\/RTH-645342-D2_2 ."},{"key":"587_CR17","doi-asserted-by":"crossref","unstructured":"M Jones, J Bradley, N Sakimura (2015) JSON Web Token (JWT), IETF Standard","DOI":"10.17487\/RFC7519"},{"key":"587_CR18","unstructured":"J-M Crom (2015) Management and security features specifications, reTHINK project Deliverable http:\/\/dx.doi.org\/10.18153\/RTH-645342-D4_1"},{"key":"587_CR19","doi-asserted-by":"crossref","unstructured":"I Javed, K Toumi, N Crespi, A Mohammadinejad Br2Br: a vector-based trust framework for WebRTC calling services. IEEE IEEE International Conference on High Performance Computing and Communications (HPCC 2016), 12\u201314 December, Sydney, Australia","DOI":"10.1109\/HPCC-SmartCity-DSS.2016.0080"},{"key":"587_CR20","unstructured":"J-M Crom Implementation of governance and identity management components, reTHINK Project Deliverable"},{"key":"587_CR21","doi-asserted-by":"crossref","unstructured":"I Friese, R Copeland, S G\u00f6nd\u00f6r, F Beierle, A K\u00fcpper, R Pereir and J-M Crom (2017) Cross-domain discovery of communication peers. Identity mapping and discovery services (IMaDS), IEEE European Conference on Networks and Communications (EuCNC)","DOI":"10.1109\/EuCNC.2017.7980642"},{"key":"587_CR22","doi-asserted-by":"crossref","unstructured":"S G\u00f6nd\u00f6r, F Beierle, S Sharhan, A K\u00fcpper (2016) Distributed and domain-independent identity management for user profiles in the SONIC Online Social Network Federation, International Conference on Computational Social Networks, Springer","DOI":"10.1007\/978-3-319-42345-6_20"},{"key":"587_CR23","unstructured":"S G\u00f6nd\u00f6r, F Beierle, E K\u00fc\u00e7\u00fckbayraktar, H Hebbo, S Sherhan, A K\u00fcpper (2015) Towards migration of user profiles in the SONIC Online Social Network Federation, International Multi-Conference on Computing in the Global Information Technology (ICCGI)"},{"key":"587_CR24","unstructured":"Alliance, Open Mobile (2013) Lightweight machine to machine technical specification. Technical Specification OMA-TS-LightweightM2M-V1"},{"key":"587_CR25","doi-asserted-by":"crossref","unstructured":"Z Shelby (2012) Constrained RESTful environments (CoRE) link format, IETF standard","DOI":"10.17487\/rfc6690"},{"key":"587_CR26","unstructured":"R Copeland, K Corre, I Friese, S El Jaouhari (2016) Requirements for trust and privacy in WebRTC peer-to-peer Authentication IETF internet draft"},{"key":"587_CR27","doi-asserted-by":"crossref","unstructured":"A Cooper et al. (2013) Privacy considerations for Internet protocols, IETF RFC 6973","DOI":"10.17487\/rfc6973"},{"key":"587_CR28","doi-asserted-by":"crossref","unstructured":"R Yavatkar, D Pendarakis, R Guerin (1999) A framework for policy-based admission control, IETF RFC 2753","DOI":"10.17487\/rfc2753"},{"key":"587_CR29","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-44569-2_2","volume-title":"The ponder policy specification language, policies for distributed systems and networks","author":"N Damianou","year":"2001","unstructured":"Damianou N, Dulay N, Lupu E, Sloman M (2001) The ponder policy specification language, policies for distributed systems and networks. Springer, Berlin, pp 18\u201338"},{"key":"587_CR30","unstructured":"D Crockford (2006) JSON: the fat-free alternative to XML, XML 2006 Conference, Boston"},{"key":"587_CR31","doi-asserted-by":"crossref","unstructured":"F Beierle, S G\u00f6nd\u00f6r, A K\u00fcpper (2015) Towards a three-tiered social graph in decentralized online social networks, Workshop on Hot Topics in Planet-scale mobile computing and online Social networking (HotPOST \u201815), ACM","DOI":"10.1145\/2757513.2757517"},{"key":"587_CR32","volume-title":"BLIP: non-interactive differentially-private similarity computation on bloom filters, symposium on self-stabilizing systems","author":"M Alaggan","year":"2012","unstructured":"Alaggan M, Gambs S, Kermarrec A (2012) BLIP: non-interactive differentially-private similarity computation on bloom filters, symposium on self-stabilizing systems. Springer, Berlin"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12243-017-0587-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-017-0587-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-017-0587-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T21:15:04Z","timestamp":1569532504000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12243-017-0587-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,24]]},"references-count":32,"journal-issue":{"issue":"7-8","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["587"],"URL":"https:\/\/doi.org\/10.1007\/s12243-017-0587-2","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2017,6,24]]}}}