{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T03:32:05Z","timestamp":1725679925672},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,6]]},"DOI":"10.1109\/isi.2008.4565043","type":"proceedings-article","created":{"date-parts":[[2008,7,17]],"date-time":"2008-07-17T20:05:44Z","timestamp":1216325144000},"page":"137-144","source":"Crossref","is-referenced-by-count":9,"title":["Identity management architecture"],"prefix":"10.1109","author":[{"given":"Uwe","family":"Glasser","sequence":"first","affiliation":[]},{"given":"Mona","family":"Vajihollahi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1228175.1228231"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250581"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00217-1"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/11427995_30"},{"key":"13","article-title":"identity in digital government","author":"camp","year":"2003","journal-title":"a research report of the Digital Government Civic Scenario Workshop"},{"journal-title":"Identity Crisis How Identification Is Overused and Misunderstood","year":"2006","author":"harper","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1504\/IJBPIM.2006.012626"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1117\/12.777767"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/WCMEB.2007.5"},{"year":"0","key":"20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.31"},{"journal-title":"The Laws of identity","year":"2005","author":"cameron","key":"23"},{"journal-title":"January-last visited) Website","year":"2008","key":"24"},{"year":"0","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-18216-7"},{"key":"27","first-page":"2008","author":"gla?sser","year":"2002","journal-title":"Identity management architecture"},{"journal-title":"7 Laws of Identity The Case for Privacy-Embedded Laws of Identity in the Digital Age","year":"2006","author":"cavoukian","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2004.1337889"},{"year":"0","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/s10550-006-0003-3"},{"year":"0","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2006.871120"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2006.169"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICNICONSMCL.2006.152"},{"journal-title":"January-last visited) Website","year":"2008","key":"9"},{"journal-title":"Identity Management Systems (IMS) Identification and Comparison Study","article-title":"germany and studio genghini & associati, italy","year":"2003","key":"8"}],"event":{"name":"2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)","start":{"date-parts":[[2008,6,17]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2008,6,20]]}},"container-title":["2008 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4557995\/4565003\/04565043.pdf?arnumber=4565043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,16]],"date-time":"2017-03-16T16:32:24Z","timestamp":1489681944000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4565043\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,6]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/isi.2008.4565043","relation":{},"subject":[],"published":{"date-parts":[[2008,6]]}}}