{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T14:42:24Z","timestamp":1771857744742,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/chinacom.2011.6158260","type":"proceedings-article","created":{"date-parts":[[2012,2,28]],"date-time":"2012-02-28T20:43:51Z","timestamp":1330461831000},"page":"785-789","source":"Crossref","is-referenced-by-count":10,"title":["A federated identity management system with centralized trust and unified Single Sign-On"],"prefix":"10.1109","author":[{"family":"Jian Jiang","sequence":"first","affiliation":[]},{"family":"Haixin Duan","sequence":"additional","affiliation":[]},{"family":"Tao Lin","sequence":"additional","affiliation":[]},{"family":"Fenglin Qin","sequence":"additional","affiliation":[]},{"family":"Hong Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1179529.1179532"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.12921\/cmst.2005.11.02.169-173"},{"key":"15","year":"0","journal-title":"Incommon Identity and Access Management"},{"key":"16","article-title":"Edugain profiles and implementation guidelines","author":"lopez","year":"2006","journal-title":"GE?ANT2"},{"key":"13","article-title":"Shibboleth architecture","author":"scavo","year":"2005","journal-title":"Internet2 Technical Overview"},{"key":"14","year":"0","journal-title":"Simplesamlphp"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.19"},{"key":"12","year":"0","journal-title":"Kerberos Work Group"},{"key":"21","year":"0","journal-title":"Discoveryservice"},{"key":"3","author":"mcintosh","year":"2007","journal-title":"WS-I Basic Security Profile Version 1 0"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73408-6_12"},{"key":"2","author":"wason","year":"2004","journal-title":"Liberty ID-FF Architecture Overview"},{"key":"1","author":"cantor","year":"2005","journal-title":"Assertions and Protocols for the Oasis Security Assertion Markup Language (SAML) V2 0"},{"key":"10","doi-asserted-by":"crossref","first-page":"361","DOI":"10.1007\/BFb0055875","article-title":"Kerberos version 4: Inductive analysis of the secrecy goals","author":"bella","year":"1998","journal-title":"ESORICS '98"},{"key":"7","article-title":"A real-world analysis of kerberos password security","author":"wu","year":"1999","journal-title":"NDSS"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/381906.381946"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"4","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1109\/MSP.2008.31","article-title":"Dynamic security assertion markup language: Simplifying single sign-on","volume":"6","author":"patrick","year":"2008","journal-title":"IEEE Security and Privacy"},{"key":"9","first-page":"1337","article-title":"Formal analysis of the kerberos authentication system","volume":"3","author":"bella","year":"1997","journal-title":"Journal of Universal Computer Science"},{"key":"8","article-title":"The perils of unauthenticated encryption: Kerberos version 4","author":"yu","year":"2004","journal-title":"NDSS"}],"event":{"name":"2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)","location":"Harbin, China","start":{"date-parts":[[2011,8,17]]},"end":{"date-parts":[[2011,8,19]]}},"container-title":["2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6153170\/6158103\/06158260.pdf?arnumber=6158260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T14:57:15Z","timestamp":1497970635000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6158260\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2011.6158260","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}