{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,22]],"date-time":"2025-07-22T10:38:58Z","timestamp":1753180738463,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/cist.2016.7804984","type":"proceedings-article","created":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T17:19:51Z","timestamp":1483636791000},"page":"736-740","source":"Crossref","is-referenced-by-count":15,"title":["Identity management systems: Laws of identity for models<sup>7<\/sup> evaluation"],"prefix":"10.1109","author":[{"given":"Hasnae","family":"L'Amrani","sequence":"first","affiliation":[]},{"given":"Badr Eddine","family":"Berroukech","sequence":"additional","affiliation":[]},{"given":"Younes","family":"El Bouzekri El Idrissi","sequence":"additional","affiliation":[]},{"given":"Rachida","family":"Ajhoun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"The Laws of Identity","year":"2005","author":"cameron","key":"ref10"},{"key":"ref11","article-title":"Privacy-enhanced User-Centric Identity Management","author":"gail-joon ahn","year":"2009","journal-title":"IEEE ICC"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20769-3_14"},{"key":"ref13","article-title":"Federated Identity Architectures","author":"fragoso-rodriguez","year":"2006","journal-title":"Conference in technical cooperation Mcis"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87742-4"},{"article-title":"Gestion de la scurit dans une infrastructure de services dynamique: Une approche par gestion des risques","year":"2012","author":"nassar","key":"ref15"},{"key":"ref16","article-title":"Langage de balisage d'assertion de scurit (SAML2.0)","author":"l'uit","year":"2006","journal-title":"Patent X 1141"},{"key":"ref17","article-title":"Security Assertion Markup Language (SAML) V2. 0","author":"hughes j","year":"2005","journal-title":"OASIS SSTC Working Draft"},{"article-title":"Modle de Respect de la Vie Prive dans une Architecture d(identi federee","year":"2009","author":"fragoso-rodriguez","key":"ref18"},{"journal-title":"Services Web en J2EE et NET conception et implmentation","year":"2003","author":"maesano","key":"ref19"},{"key":"ref4","first-page":"131","article-title":"Dynamic Identity Federation Using Security Assertion Markup Language (SAML)","volume":"396","author":"poet","year":"2013","journal-title":"IDMAN 2013 IFIP AICT"},{"journal-title":"Geant Project","article-title":"EduGAIN","year":"0","key":"ref3"},{"key":"ref6","first-page":"13","article-title":"Mathematical Modeling of Trust Issues in Federated Identity Management","volume":"454","author":"sadek ferdous","year":"2015","journal-title":"IFIPTM 2015 IFIP AICT"},{"key":"ref5","first-page":"259","article-title":"How to Fedrate VISION Clouds throught SAML\/Shibboleth Authentication","volume":"7592","author":"villari","year":"2012","journal-title":"ESOCC 2012 LNCS"},{"key":"ref8","article-title":"IAM - Gestion des identits et des aces: concepts et tats de lart","author":"harry","year":"2013","journal-title":"Centre National de la Recherche Scientifique"},{"key":"ref7","article-title":"Access Control Systems Security","author":"benantar","year":"2006","journal-title":"Identity Management and Trust Models"},{"key":"ref2","first-page":"307","article-title":"Gant-TrustBroker: Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures","author":"daniela pohn","year":"2014","journal-title":"IFIP AICT 428 International Federation for Information Processing 2014"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16515-3_32"},{"article-title":"Identity Blog","year":"0","author":"cameron","key":"ref9"},{"article-title":"Research and Implementation of a SAML-based SSO module","year":"2012","author":"zhenhua","key":"ref20"},{"key":"ref21","first-page":"17","article-title":"Secure Identity Management System for for Federated Cloud Environment","author":"umme habiba","year":"2015","journal-title":"Studies in Computational Intelligence"}],"event":{"name":"2016 4th IEEE International Colloquium on Information Science and Technology (CIST)","start":{"date-parts":[[2016,10,24]]},"location":"Tangier, Morocco","end":{"date-parts":[[2016,10,26]]}},"container-title":["2016 4th IEEE International Colloquium on Information Science and Technology (CiSt)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786012\/7804840\/07804984.pdf?arnumber=7804984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,20]],"date-time":"2017-01-20T06:40:51Z","timestamp":1484894451000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7804984\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/cist.2016.7804984","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}