{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T08:36:09Z","timestamp":1725784569455},"reference-count":34,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,9,1]],"date-time":"2019-09-01T00:00:00Z","timestamp":1567296000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1109\/etfa.2019.8868982","type":"proceedings-article","created":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T19:18:52Z","timestamp":1571339932000},"page":"1745-1751","source":"Crossref","is-referenced-by-count":5,"title":["Cross-Federation Identities for IoT Devices in Cellular Networks"],"prefix":"10.1109","author":[{"given":"Bernardo","family":"Santos","sequence":"first","affiliation":[]},{"given":"Bruno","family":"Dzogovic","sequence":"additional","affiliation":[]},{"given":"Boning","family":"Feng","sequence":"additional","affiliation":[]},{"given":"Van Thuan","family":"Do","sequence":"additional","affiliation":[]},{"given":"Niels","family":"Jacot","sequence":"additional","affiliation":[]},{"given":"Thanh","family":"Van Do","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"AppAuth","year":"0","key":"ref33"},{"journal-title":"Nuki Smart Lock","year":"0","key":"ref32"},{"journal-title":"Leshan","year":"0","key":"ref31"},{"journal-title":"USRP N200","year":"0","key":"ref30"},{"journal-title":"Java language","year":"0","key":"ref34"},{"journal-title":"OpenIDConnect","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SmartWorld.2018.00349"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSCN.2017.8088629"},{"key":"ref13","article-title":"Remote networking technology for IoT: Cloud-based access for AllJoyn-enabled devices","author":"masek","year":"0","journal-title":"14th Conference of Open Innovation Association FRUCT"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2018.01.005"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2017.2777480"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2016.2614421"},{"journal-title":"GluuServer&#x2013;","year":"0","key":"ref17"},{"journal-title":"Active Discovery","year":"0","key":"ref18"},{"journal-title":"LDAP","year":"0","key":"ref19"},{"journal-title":"Equifax Data Breach One Year Later Obvious Errors and No Real Changes New Report Says Fortune","year":"2018","author":"fleishman","key":"ref28"},{"journal-title":"Timo Olkkonen Generic Authentication Architecture","year":"0","key":"ref4"},{"journal-title":"The Hunt for IOT The Growth and Evolution of Thingbots Ensures Chaos","year":"2018","author":"boddy","key":"ref27"},{"journal-title":"Generic Authentication Architecture (GAA) Generic bootstrapping architecture (Release 9)","article-title":"3rd Generation Partnership Project: 3GPP TS 33.220 V8.2.0 (2007&#x2013;12) Technical Specification Group Services and System Aspects","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2017.8090839"},{"journal-title":"The OpenAirInterfaceTM Software Alliance (OSA)","year":"0","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23144-0_3"},{"key":"ref8","first-page":"12","article-title":"A Survey of User-centric Identity Management Technologies Requirements","author":"maliki","year":"0","journal-title":"International Conference on Emerging Security Information Systems and Technologies"},{"key":"ref7","first-page":"1","article-title":"Digital identity as a key enabler for e-government services","author":"lenco","year":"2016","journal-title":"GSMA Mobile Connect"},{"journal-title":"TS 31 102 Characteristics of the Universal Subscriber Identity Module (USIM) application ver 16-06-2017","year":"0","key":"ref2"},{"year":"2012","key":"ref9","article-title":"IETF Request for Comments: 6749: The OAuth 2.0 Authorization Framework"},{"journal-title":"TS 11 11 Specification of the Subscriber Identity Module - Mobile Equipment (SIM-ME) Interface ver 8 14 0","year":"2007","key":"ref1"},{"journal-title":"Gluu LDAP Synchronization","year":"0","key":"ref20"},{"journal-title":"Gluu UMA 2 0 Authorization Server","year":"0","key":"ref22"},{"journal-title":"Gluu SCIM 2 0 User Management","year":"0","key":"ref21"},{"journal-title":"ET Docker","year":"0","key":"ref24"},{"journal-title":"OpenStack Mirantis","year":"0","key":"ref23"},{"journal-title":"Openvswitch","year":"0","key":"ref26"},{"journal-title":"CALICO","year":"0","key":"ref25"}],"event":{"name":"2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)","start":{"date-parts":[[2019,9,10]]},"location":"Zaragoza, Spain","end":{"date-parts":[[2019,9,13]]}},"container-title":["2019 24th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8851311\/8868236\/08868982.pdf?arnumber=8868982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T10:48:39Z","timestamp":1658141319000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8868982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/etfa.2019.8868982","relation":{},"subject":[],"published":{"date-parts":[[2019,9]]}}}