{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:54:20Z","timestamp":1747810460979},"reference-count":16,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2003,11,1]],"date-time":"2003-11-01T00:00:00Z","timestamp":1067644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Internet Comput."],"published-print":{"date-parts":[[2003,11]]},"DOI":"10.1109\/mic.2003.1250582","type":"journal-article","created":{"date-parts":[[2003,12,10]],"date-time":"2003-12-10T21:45:47Z","timestamp":1071092747000},"page":"38-44","source":"Crossref","is-referenced-by-count":49,"title":["Analysis of liberty single-sign-on with enabled clients"],"prefix":"10.1109","volume":"7","author":[{"given":"B.","family":"Pfitzmann","sequence":"first","affiliation":[]},{"given":"M.","family":"Waidner","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"bibw60382","article-title":"bindings and profiles for the oasis security assertion markup language (saml)","author":"mishra","year":"2002"},{"key":"bibw60381","article-title":"assertions and protocol for the oasis security assertion markup language (saml)","author":"hallam-baker","year":"2002"},{"key":"bibw60388","article-title":"simple object access protocol (soap) 1.1","author":"box","year":"2000"},{"key":"bibw60381A","article-title":"security analysis of the saml single sign-on browser\/artifact profile","author":"gro","year":"2003","journal-title":"Proc Ann Computer Security Applications Conf"},{"key":"bibw60387","article-title":"liberty version 1.0 errata","year":"2002"},{"key":"bibw60389","article-title":"liberty protocols and schemas specification","volume":"1","year":"2002"},{"key":"bibw60384","article-title":"liberty architecture overview","volume":"1","year":"2002"},{"key":"bibw60383","article-title":"shibboleth architecture draft v05","author":"erds","year":"2002"},{"key":"bibw60386","author":"menezes","year":"1997","journal-title":"Handbook of Applied Cryptography"},{"key":"bibw60385","article-title":"liberty bindings and profiles specification","volume":"1","year":"2002"},{"key":"bibw60382A","article-title":"liberty architecture overview","volume":"1","year":"2003"},{"key":"bibw603811","doi-asserted-by":"publisher","DOI":"10.1109\/32.481513"},{"key":"bibw603810","article-title":"web services security: soap message security","author":"nadalin","year":"2003"},{"key":"bibw603813","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00048-7"},{"key":"bibw603812","article-title":"microsoft settles ftc charges alleging false security and privacy promises","year":"2002"},{"key":"bibw603814","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644533"}],"container-title":["IEEE Internet Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4236\/27995\/01250582.pdf?arnumber=1250582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:51:03Z","timestamp":1642006263000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1250582\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,11]]},"references-count":16,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2003,11]]}},"URL":"https:\/\/doi.org\/10.1109\/mic.2003.1250582","relation":{},"ISSN":["1089-7801"],"issn-type":[{"value":"1089-7801","type":"print"}],"subject":[],"published":{"date-parts":[[2003,11]]}}}