{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T01:18:51Z","timestamp":1725671931297},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ccis.2012.6664435","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:48:02Z","timestamp":1385588882000},"page":"397-401","source":"Crossref","is-referenced-by-count":7,"title":["Secure cloud authentication using eIDs"],"prefix":"10.1109","author":[{"given":"Bernd","family":"Zwattendorfer","sequence":"first","affiliation":[]},{"given":"Arne","family":"Tauber","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Digital identity interoperability and einnovation","author":"palfrey","year":"2007","journal-title":"Case Study"},{"key":"2","article-title":"D3. 1:structured overview on prototypes and concepts of identity management system","author":"bauer","year":"2005","journal-title":"FIDIS"},{"key":"1","article-title":"Passwords-Strengths and weaknesses","author":"kessler","year":"1997","journal-title":"Network and Internetwork Security"},{"journal-title":"EID Interoperability for PEGS Update of Country Profiles","year":"2009","key":"7"},{"key":"6","first-page":"1","article-title":"Cloud computing security management","author":"al mulla","year":"2010","journal-title":"Engineering Systems Management and Its Applications"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-73530-4_1","article-title":"Identity as a service-Towards a service-oriented identity management architecture","author":"emig","year":"2007","journal-title":"Lecture Notes in Computer Science"},{"journal-title":"Identity and Access Management for the Cloud CA's Strategy and Vision","year":"2010","author":"goulding","key":"4"},{"key":"9","article-title":"D5. 8. 3b interface specification","author":"alcalde-morano","year":"2011","journal-title":"STORK Deliverable"},{"key":"8","first-page":"131","article-title":"Stork: Architecture, implementation and pilots","author":"leitold","year":"2010","journal-title":"ISSE 2010 Conference"}],"event":{"name":"2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems (CCIS)","start":{"date-parts":[[2012,10,30]]},"location":"Hangzhou, China","end":{"date-parts":[[2012,11,1]]}},"container-title":["2012 IEEE 2nd International Conference on Cloud Computing and Intelligence Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6637132\/6664354\/06664435.pdf?arnumber=6664435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T03:16:32Z","timestamp":1498101392000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6664435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ccis.2012.6664435","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}