{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T18:36:19Z","timestamp":1725734179075},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/cit.2008.4594710","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T22:40:13Z","timestamp":1218667213000},"page":"408-413","source":"Crossref","is-referenced-by-count":5,"title":["Identity Management Architecture: A new direction"],"prefix":"10.1109","author":[{"given":"Peter","family":"White","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Case Study Research Methods","year":"2000","author":"gillham","key":"19"},{"year":"0","key":"22"},{"key":"17","article-title":"identity based management: extending the isms for federation","author":"woodhouse","year":"2007","journal-title":"ISACA Oceania Computer Audit Control and Security Conference 2007"},{"key":"23","article-title":"identity management architecture in the australian public sector","author":"white","year":"2008","journal-title":"5th International Conference on Information Technology and Applications ICITA 2008 Cairns QLD"},{"journal-title":"Case Study Research Design and Methods","year":"2003","author":"yin","key":"18"},{"journal-title":"Enterprise Architecture - Using the Zuchman framework","year":"2003","author":"o'rourke","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1147\/sj.263.0276"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00217-1"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(04)00014-7"},{"key":"11","doi-asserted-by":"crossref","DOI":"10.6028\/NIST.IR.7316","author":"hu","year":"2006","journal-title":"Assessment of Access Control Systems"},{"key":"12","article-title":"community support and identity management","author":"koch","year":"2001","journal-title":"Seventh European Conference on Computer-Supported Cooperative Work"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/972374.972376"},{"year":"0","key":"3"},{"journal-title":"Constructing grounded theory A practical guide through qualitative analysis","year":"2006","author":"charmaz","key":"20"},{"journal-title":"Identity & Access Management Framework Project Action Plan (Draft Final V2 0)","year":"2005","key":"2"},{"journal-title":"Shared Corporate Services Strategy","year":"2003","key":"1"},{"journal-title":"On Adaptive Identity Management The Next Generation of Identity Management Technologies","year":"2003","author":"casassa mont","key":"10"},{"key":"7","article-title":"an internal enterprise framework for identity based management","author":"white","year":"2007","journal-title":"Australian Partnership for Advanced Computing 07"},{"journal-title":"Identity Management Business Scenario","year":"2002","key":"6"},{"journal-title":"Digital Identity","year":"2005","author":"windley","key":"5"},{"journal-title":"Framework for Analysing Planning and Implementing Identity Management with E-Health","year":"2007","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871796"},{"key":"8","article-title":"using international standards in your compliance program","author":"pearsons","year":"2007","journal-title":"Sydney Secure Computing Magazine"}],"event":{"name":"2008 8th IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2008,7,8]]},"location":"Sydney, Australia","end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 8th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586225\/4594630\/04594710.pdf?arnumber=4594710","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T10:55:41Z","timestamp":1497783341000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594710\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cit.2008.4594710","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}