{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:57:59Z","timestamp":1750309079368,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1103022.1103034","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"54-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Proving a WS-federation passive requestor profile with a browser model"],"prefix":"10.1145","author":[{"given":"Thomas","family":"Gro\u03b2","sequence":"first","affiliation":[{"name":"IBM Research Division, R\u00fcschlikon, Switzerland"}]},{"given":"Birgit","family":"Pfitzmann","sequence":"additional","affiliation":[{"name":"IBM Research Division, R\u00fcschlikon, Switzerland"}]},{"given":"Ahmad-Reza","family":"Sadeghi","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0062-8"},{"key":"e_1_3_2_1_2_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1007\/3-540-48329-2_21","volume-title":"Advances in Cryptology: CRYPTO '93","author":"Bellare M.","year":"1994","unstructured":"M. Bellare and P. Rogaway . Entity authentication and key distribution . In Advances in Cryptology: CRYPTO '93 , volume 773 of Lecture Notes in Computer Science , pages 232 -- 249 . Springer , 1994 . M. Bellare and P. Rogaway. Entity authentication and key distribution. In Advances in Cryptology: CRYPTO '93, volume 773 of Lecture Notes in Computer Science, pages 232--249. Springer, 1994."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/647087.715825"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1983.1056650"},{"key":"e_1_3_2_1_6_1","volume-title":"June","author":"Fielding R. T.","year":"1999","unstructured":"R. T. Fielding , J. Gettys , J. C. Mogul , H. Frystyk , L. Masinter , P. Leach , and T. Berners-Lee . RFC 2616: Hypertext transfer protocol -- HTTP\/1.1 , June 1999 . R. T. Fielding, J. Gettys, J. C. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC 2616: Hypertext transfer protocol -- HTTP\/1.1, June 1999."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 10th USENIX Security Symposium Washington, D.C.","author":"Fu K.","year":"2001","unstructured":"K. Fu , E. Sit , K. Smith , and N. Feamster . Dos and don'ts of client authentication on the web . In Proceedings of the 10th USENIX Security Symposium Washington, D.C. , Aug. 2001 . USENIX. K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and don'ts of client authentication on the web. In Proceedings of the 10th USENIX Security Symposium Washington, D.C., Aug. 2001. USENIX."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1137\/0217017"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/764792.764797"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/956415.956441"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111348.1111357"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11555827_28"},{"key":"e_1_3_2_1_14_1","first-page":"w6","article-title":"Passive Requestor Federation Interop Scenario","volume":"4","author":"Hur M.","year":"2004","unstructured":"M. Hur , R. D. Johnson , A. Medvinsky , Y. Rouskov , J. Spellman , S. Weeden , and A. Nadalin . Passive Requestor Federation Interop Scenario , Version 0 . 4 , Feb. 2004 . newblock ftp:\/\/ww w6 .software.ibm.com\/software\/developer\/library\/ws-fpscenario2.doc. M. Hur, R. D. Johnson, A. Medvinsky, Y. Rouskov, J. Spellman, S. Weeden, and A. Nadalin. Passive Requestor Federation Interop Scenario, Version 0.4, Feb. 2004. newblock ftp:\/\/www6.software.ibm.com\/software\/developer\/library\/ws-fpscenario2.doc.","journal-title":"Version 0"},{"key":"e_1_3_2_1_15_1","volume-title":"Web Services Federation Language","author":"Kaler C.","year":"2003","unstructured":"C. Kaler and A. Nadalin . Web Services Federation Language ( WS-Federation) , Version 1.0, July 2003 . BEA, IBM, Microsoft, RSA Security and VeriSign http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-fed\/. C. Kaler and A. Nadalin. Web Services Federation Language (WS-Federation), Version 1.0, July 2003. BEA, IBM, Microsoft, RSA Security and VeriSign http:\/\/www-106.ibm.com\/developerworks\/webservices\/library\/ws-fed\/."},{"key":"e_1_3_2_1_16_1","volume-title":"Version 1.0","author":"Kaler C.","year":"2003","unstructured":"C. Kaler and A. Nadalin . WS-Federation: Passive Requestor Profile , Version 1.0 , July 2003 . BEA and IBM and Microsoft and RSA Security and VeriSign , http:\/\/www-106.ibm.com\/developerworks\/library\/ws-fedpass\/. C. Kaler and A. Nadalin. WS-Federation: Passive Requestor Profile, Version 1.0, July 2003. BEA and IBM and Microsoft and RSA Security and VeriSign, http:\/\/www-106.ibm.com\/developerworks\/library\/ws-fedpass\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00048-7"},{"key":"e_1_3_2_1_18_1","volume-title":"Nov.","author":"Project Liberty Alliance","year":"2003","unstructured":"Liberty Alliance Project . Liberty Phase 2 final specifications , Nov. 2003 . http:\/\/www.projectliberty.org\/. Liberty Alliance Project. Liberty Phase 2 final specifications, Nov. 2003. http:\/\/www.projectliberty.org\/."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(95)00144-2"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/794199.795128"},{"key":"e_1_3_2_1_21_1","volume-title":"Sept.","author":"Microsoft Corporation","year":"2001","unstructured":"Microsoft Corporation . NET Passport documentation , in particular Technical Overview, and SDK 2.1 Documentation , Sept. 2001 . Microsoft Corporation.NET Passport documentation, in particular Technical Overview, and SDK 2.1 Documentation, Sept. 2001."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/359657.359659"},{"key":"e_1_3_2_1_23_1","volume-title":"Nov.","author":"Standard OASIS","year":"2002","unstructured":"OASIS Standard . Security assertion markup language (SAML) V1.1 , Nov. 2002 . http:\/\/www.oasis-open.org\/committees\/security\/. OASIS Standard. Security assertion markup language (SAML) V1.1, Nov. 2002. http:\/\/www.oasis-open.org\/committees\/security\/."},{"key":"e_1_3_2_1_24_1","volume-title":"Mar.","author":"Object Managent Group","year":"2003","unstructured":"Object Managent Group . Unified modeling language (UML) , Mar. 2003 . http:\/\/www.omg.org\/technology\/documents\/formal\/uml.htm. Object Managent Group. Unified modeling language (UML), Mar. 2003. http:\/\/www.omg.org\/technology\/documents\/formal\/uml.htm."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/882495.884436"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644533"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2003.1250582"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/11542322_20"},{"key":"e_1_3_2_1_29_1","volume-title":"IBM Research","author":"Shoup V.","year":"1999","unstructured":"V. Shoup . On formal models for secure key exchange. Research Report RZ 3120 (#93166) , IBM Research , Apr. 1999 . V. Shoup. On formal models for secure key exchange. Research Report RZ 3120 (#93166), IBM Research, Apr. 1999."}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 workshop on Secure web services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103022.1103034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1103022.1103034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:43:24Z","timestamp":1750286604000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1103022.1103034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":28,"alternative-id":["10.1145\/1103022.1103034","10.1145\/1103022"],"URL":"https:\/\/doi.org\/10.1145\/1103022.1103034","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}