{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:51Z","timestamp":1750307691975,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,31]],"date-time":"2008-10-31T00:00:00Z","timestamp":1225411200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,31]]},"DOI":"10.1145\/1456424.1456438","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"81-88","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Cross-identifier domain discovery service for unrelated user identities"],"prefix":"10.1145","author":[{"given":"Marcin","family":"Dabrowski","sequence":"first","affiliation":[{"name":"AGH University of Science and Technology, Krakow, Poland"}]},{"given":"Piotr","family":"Pacyna","sequence":"additional","affiliation":[{"name":"AGH University of Science and Technology, Krakow, Poland"}]}],"member":"320","published-online":{"date-parts":[[2008,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Futuretext","author":"Radhakrishnan R.","year":"2007","unstructured":"R. Radhakrishnan , \" Identity &amp; Security . A Common Architecture &amp; Framework for SOA and Network Convergence \", Futuretext , 2007 R. Radhakrishnan, \"Identity &amp; Security. A Common Architecture &amp; Framework for SOA and Network Convergence\", Futuretext, 2007"},{"key":"e_1_3_2_1_2_1","unstructured":"Liberty Alliance Project \"Liberty ID-WSF Discovery Service Specification  Liberty Alliance Project \"Liberty ID-WSF Discovery Service Specification"},{"key":"e_1_3_2_1_3_1","unstructured":"Focus Group on Identity Management \"Report on Identity Management Use Cases and Gap Analysis\" ITU-T 2007  Focus Group on Identity Management \"Report on Identity Management Use Cases and Gap Analysis\" ITU-T 2007"},{"key":"e_1_3_2_1_4_1","volume-title":"O'Reilly","author":"Windley P.","year":"2005","unstructured":"P. Windley : \" Digital Identity \", O'Reilly , 2005 P. Windley: \"Digital Identity \", O'Reilly, 2005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2004.1337889"},{"key":"e_1_3_2_1_6_1","unstructured":"D.V. Thanh I. Jorstadt \"The Ambiguity of Identity\" Teletronikk Vol.3 2007  D.V. Thanh I. Jorstadt \"The Ambiguity of Identity\" Teletronikk Vol.3 2007"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 2005 Australasian workshop on Grid computing and e-research --","volume":"44","author":"J\u00f8sang Audun","year":"2005","unstructured":"Audun J\u00f8sang , John Fabre , Brian Hay , James Dalziel , Simon Pope1, \" Trust Requirements in Identity Management\" , Proceedings of the 2005 Australasian workshop on Grid computing and e-research -- Volume 44 , 2005 Audun J\u00f8sang, John Fabre, Brian Hay, James Dalziel , Simon Pope1, \"Trust Requirements in Identity Management\", Proceedings of the 2005 Australasian workshop on Grid computing and e-research -- Volume 44, 2005"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECURWARE.2008.18"},{"key":"e_1_3_2_1_9_1","unstructured":"Anonymous -- P2P.org http:\/\/www.anonymous-p2p.org\/  Anonymous -- P2P.org http:\/\/www.anonymous-p2p.org\/"},{"key":"e_1_3_2_1_10_1","unstructured":"Yadis Specification 1.0  Yadis Specification 1.0"},{"key":"e_1_3_2_1_11_1","unstructured":"XRI 2.0 Resolution  XRI 2.0 Resolution"},{"key":"e_1_3_2_1_12_1","unstructured":"Shibboleth Architecture -- Technical Overview  Shibboleth Architecture -- Technical Overview"},{"key":"e_1_3_2_1_13_1","unstructured":"Liberty Alliance Project \"Access to Identity-Enabled Web Services in Cross-Border Inter-Federation Scenarios  Liberty Alliance Project \"Access to Identity-Enabled Web Services in Cross-Border Inter-Federation Scenarios"}],"event":{"name":"CCS08: 15th ACM Conference on Computer and Communications Security 2008","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS08"},"container-title":["Proceedings of the 4th ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456424.1456438","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1456424.1456438","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:54Z","timestamp":1750253394000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1456424.1456438"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,31]]},"references-count":13,"alternative-id":["10.1145\/1456424.1456438","10.1145\/1456424"],"URL":"https:\/\/doi.org\/10.1145\/1456424.1456438","relation":{},"subject":[],"published":{"date-parts":[[2008,10,31]]},"assertion":[{"value":"2008-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}