{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:23:25Z","timestamp":1771230205667,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T00:00:00Z","timestamp":1620000000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100007944","name":"Shahjalal University of Science and Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007944","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,3]]},"DOI":"10.1109\/icbc51069.2021.9461128","type":"proceedings-article","created":{"date-parts":[[2021,6,24]],"date-time":"2021-06-24T20:16:55Z","timestamp":1624565815000},"page":"1-9","source":"Crossref","is-referenced-by-count":9,"title":["Dynamic Management of Identity Federations using Blockchain"],"prefix":"10.1109","author":[{"given":"Ifteher","family":"Alom","sequence":"first","affiliation":[]},{"given":"Romana Mahjabin","family":"Eshita","sequence":"additional","affiliation":[]},{"given":"Anam","family":"Ibna Harun","sequence":"additional","affiliation":[]},{"given":"Md Sadek","family":"Ferdous","sequence":"additional","affiliation":[]},{"given":"Mirza","family":"Kamrul Bashar Shuhan","sequence":"additional","affiliation":[]},{"given":"Mohammad Jabed M","family":"Chowdhury","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Shahidur Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","article-title":"Apache jmeter","author":"jmeter","year":"2020"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16515-3_32"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03841-9_16"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762015000200005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2953729"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2981553"},{"key":"ref15","article-title":"Scalability of trust and metadata exchange across federations","author":"poortinga-van wijnen","year":"2010"},{"key":"ref16","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2019","journal-title":"Tech Rep"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931173"},{"key":"ref18","article-title":"Bitcoin","year":"0"},{"key":"ref19","article-title":"Ethereum","year":"0"},{"key":"ref28","article-title":"Express JS","year":"0"},{"key":"ref4","article-title":"Metadata for the OASIS security assertion markup language (SAML) V2. 0","author":"cantor","year":"2018"},{"key":"ref27","article-title":"Node","year":"0"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37282-7_13"},{"key":"ref6","article-title":"SimpleSAMLphp","year":"0"},{"key":"ref29","article-title":"Simplesamlphp documentation","year":"2020"},{"key":"ref5","article-title":"Shibboleth","author":"consortium","year":"0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.31"},{"key":"ref7","article-title":"ZXID","year":"0"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03829-7_3"},{"key":"ref9","first-page":"1","article-title":"Network and trust model for dynamic federation","author":"xiang","year":"2010","journal-title":"Proceedings of the Fourth International Conference on Advanced Engineering Computing and Applications in Sciences"},{"key":"ref1","first-page":"143","article-title":"Usability and privacy in identity management architectures","author":"josang","year":"2007","journal-title":"ACSW Frontiers 2007 Proceedings of the Fifth Australasian Symposium on ACSW Frontiers"},{"key":"ref20","article-title":"Hyperledger","year":"0"},{"key":"ref22","author":"shostack","year":"2014","journal-title":"Threat Modeling Designing for Security"},{"key":"ref21","article-title":"Quorum Blockchain","year":"0"},{"key":"ref24","article-title":"Hyperledger Sawtooth","year":"0"},{"key":"ref23","article-title":"Hyperledger Fabric","year":"0"},{"key":"ref26","article-title":"Apache Kafka","year":"0"},{"key":"ref25","article-title":"Bonik: A blockchain empowered chatbot for financial transactions","author":"bhuiyan","year":"2020","journal-title":"TrustCom 2020"}],"event":{"name":"2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","location":"Sydney, Australia","start":{"date-parts":[[2021,5,3]]},"end":{"date-parts":[[2021,5,6]]}},"container-title":["2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9460986\/9461049\/09461128.pdf?arnumber=9461128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T15:42:45Z","timestamp":1652197365000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9461128\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icbc51069.2021.9461128","relation":{},"subject":[],"published":{"date-parts":[[2021,5,3]]}}}