{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:47:57Z","timestamp":1729622877481,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/issa.2016.7802936","type":"proceedings-article","created":{"date-parts":[[2017,1,2]],"date-time":"2017-01-02T21:21:42Z","timestamp":1483392102000},"page":"106-113","source":"Crossref","is-referenced-by-count":2,"title":["Identity management for e-government Libya as a case study"],"prefix":"10.1109","author":[{"given":"Othoman","family":"Elaswad","sequence":"first","affiliation":[]},{"given":"Christian Damsgaard","family":"Jensen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","article-title":"The Evolution of India's UID Program","author":"zelazny","year":"2012","journal-title":"Center for Global Develapment"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/0267-3649(89)90030-7"},{"key":"ref10","first-page":"4","article-title":"PKI in Government Digital Identity Management Systems","volume":"4","author":"al-khouri","year":"2012","journal-title":"European Journal of ePractice"},{"key":"ref6","article-title":"Unique Identification Number and E-Governance Security","volume":"1","author":"chander","year":"2010","journal-title":"International Journal of Computing and Business Research"},{"year":"0","key":"ref11","article-title":"Libyan national identity"},{"key":"ref5","article-title":"Digital Citizenship and the Right to Digital Identity Under International Law,&#x201D; Sullivan, Clare (2014) &#x2018; Digital Citizenship and the Right to Digital Identity under International Law","author":"sullivan","year":"2014","journal-title":"Information Ethics and Security&#x201D; ed Kierkegaard S"},{"key":"ref12","first-page":"62","article-title":"UAE National ID Programme Case Study","volume":"1","author":"al-khouri","year":"2007","journal-title":"International Journal of Social Sciences"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CENTRIC.2009.13"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"3","DOI":"10.3233\/IP-2006-0085","article-title":"Personal identity management in the information polity: The case of the UK national identity card","volume":"11","author":"beynon-davies","year":"2006","journal-title":"Information Polity"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/09593849410076799"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.51"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.istr.2008.08.002"}],"event":{"name":"2016 Information Security for South Africa (ISSA)","start":{"date-parts":[[2016,8,17]]},"location":"Johannesburg, South Africa","end":{"date-parts":[[2016,8,18]]}},"container-title":["2016 Information Security for South Africa (ISSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7786562\/7802913\/07802936.pdf?arnumber=7802936","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T03:28:09Z","timestamp":1568690889000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7802936\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/issa.2016.7802936","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}