{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:10Z","timestamp":1750307290129,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,11,29]],"date-time":"2010-11-29T00:00:00Z","timestamp":1290988800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000396","name":"Technology Strategy Board","doi-asserted-by":"publisher","award":["P0007E"],"award-info":[{"award-number":["P0007E"]}],"id":[{"id":"10.13039\/501100000396","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,11,29]]},"DOI":"10.1145\/1890912.1890913","type":"proceedings-article","created":{"date-parts":[[2010,12,1]],"date-time":"2010-12-01T20:18:02Z","timestamp":1291234682000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Design and implementation of user-managed access framework for web 2.0 applications"],"prefix":"10.1145","author":[{"given":"Maciej P.","family":"Machulak","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, UK"}]},{"given":"\u0141ukasz","family":"More\u0144","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, UK"}]},{"given":"Aad","family":"van Moorsel","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle upon Tyne, UK"}]}],"member":"320","published-online":{"date-parts":[[2010,11,29]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"JSR-154: Java Servlet 2.5 Specification. http:\/\/jcp.org\/en\/jsr\/detail?id=154. Accessed 29\/09\/2010.  JSR-154: Java Servlet 2.5 Specification. http:\/\/jcp.org\/en\/jsr\/detail?id=154. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_2_1","unstructured":"OAuth leeloo. http:\/\/leeloo.smartam.net\/. Accessed 29\/09\/2010.  OAuth leeloo. http:\/\/leeloo.smartam.net\/. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_3_1","unstructured":"OpenSSO Project. https:\/\/opensso.dev.java.net\/. Accessed 29\/09\/2010.  OpenSSO Project. https:\/\/opensso.dev.java.net\/. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_4_1","unstructured":"OWASP Enterprise Security API. http:\/\/www.owasp.org\/. Accessed 29\/09\/2010.  OWASP Enterprise Security API. http:\/\/www.owasp.org\/. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_5_1","unstructured":"Spring Security. http:\/\/static.springsource.org\/spring-security. Accessed 29\/09\/2010.  Spring Security. http:\/\/static.springsource.org\/spring-security. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_6_1","unstructured":"UMA 1.0 Core Protocol. http:\/\/kantarainitiative.org\/confluence\/display\/uma\/UMA+1.0+Core+Protocol. Accessed 29\/09\/2010.  UMA 1.0 Core Protocol. http:\/\/kantarainitiative.org\/confluence\/display\/uma\/UMA+1.0+Core+Protocol. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_7_1","unstructured":"UMA Scenarios and Use Cases. http:\/\/kantarainitiative.org\/confluence\/display\/uma\/UMA+Scenarios+and+Use+Cases. Accessed 29\/09\/2010.  UMA Scenarios and Use Cases. http:\/\/kantarainitiative.org\/confluence\/display\/uma\/UMA+Scenarios+and+Use+Cases. Accessed 29\/09\/2010."},{"key":"e_1_3_2_1_8_1","volume-title":"http:\/\/www.oasis-open.org\/committees\/xacml\/","author":"Xtensible Access Control Markup OASIS","year":"2005","unstructured":"OASIS e Xtensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org\/committees\/xacml\/ , 2005 . Version 2.0. OASIS eXtensible Access Control Markup Language (XACML). http:\/\/www.oasis-open.org\/committees\/xacml\/, 2005. Version 2.0."},{"key":"e_1_3_2_1_9_1","volume-title":"November","author":"Token Simple Web","year":"2009","unstructured":"Simple Web Token . http:\/\/oauth-wrap-wg.googlegroups.com\/web\/SWT-v0.9.5.1.pdf , November 2009 . Version 0.9.5.1. Simple Web Token. http:\/\/oauth-wrap-wg.googlegroups.com\/web\/SWT-v0.9.5.1.pdf, November 2009. Version 0.9.5.1."},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/docs.oasis-open.org\/xri\/xrd\/v1.0\/xrd-1.0.html","author":"Extensible Resource","year":"2010","unstructured":"Extensible Resource Descriptor (XRD) Version 1.0. http:\/\/docs.oasis-open.org\/xri\/xrd\/v1.0\/xrd-1.0.html July 2010 . Committee Specification 01 Extensible Resource Descriptor (XRD) Version 1.0. http:\/\/docs.oasis-open.org\/xri\/xrd\/v1.0\/xrd-1.0.html July 2010. Committee Specification 01"},{"key":"e_1_3_2_1_11_1","volume-title":"June","author":"Protocol The","year":"2010","unstructured":"The OAuth 2.0 Protocol . http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2 , June 2010 . (Work in Progress). Draft 09. The OAuth 2.0 Protocol. http:\/\/tools.ietf.org\/html\/draft-ietf-oauth-v2, June 2010. (Work in Progress). Draft 09."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-008-0005-z"},{"key":"e_1_3_2_1_13_1","volume-title":"The OAuth 1.0 Protocol. RFC 5849 (Draft Standard)","author":"Hammer-Lahav E.","year":"2010","unstructured":"E. Hammer-Lahav . The OAuth 1.0 Protocol. RFC 5849 (Draft Standard) , 2010 . E. Hammer-Lahav. The OAuth 1.0 Protocol. RFC 5849 (Draft Standard), 2010."},{"key":"e_1_3_2_1_14_1","unstructured":"E. Hammer-Lahav. Web Host Metadata. http:\/\/tools.ietf.org\/html\/draft-hammer-hostmeta June 2010. (Work in Progress). Draft 13.  E. Hammer-Lahav. Web Host Metadata. http:\/\/tools.ietf.org\/html\/draft-hammer-hostmeta June 2010. (Work in Progress). Draft 13."},{"key":"e_1_3_2_1_15_1","volume-title":"WOSP '08: Proc. of the First Workshop on Online Social Networks","author":"Hart M.","year":"2008","unstructured":"M. Hart , R. Johnson , and A. Stent . More content - less control: Access control in the web 2.0 . In WOSP '08: Proc. of the First Workshop on Online Social Networks , New York, NY, USA , 2008 . M. Hart, R. Johnson, and A. Stent. More content - less control: Access control in the web 2.0. In WOSP '08: Proc. of the First Workshop on Online Social Networks, New York, NY, USA, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866865"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2010.37"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_19_1","volume-title":"The Kerberos Network Authentication Service (V5). RFC 4120 (Draft Standard)","author":"Neuman C.","year":"2005","unstructured":"C. Neuman , S. Hartman , and K. Raeburn . The Kerberos Network Authentication Service (V5). RFC 4120 (Draft Standard) , 2005 . C. Neuman, S. Hartman, and K. Raeburn. The Kerberos Network Authentication Service (V5). RFC 4120 (Draft Standard), 2005."},{"key":"e_1_3_2_1_20_1","volume-title":"Defining Well-Known Uniform Resource Identifiers (URIs). RFC 5785 (Draft Standard)","author":"Nottingham M.","year":"2010","unstructured":"M. Nottingham and E. Hammer-Lahav . Defining Well-Known Uniform Resource Identifiers (URIs). RFC 5785 (Draft Standard) , 2010 . M. Nottingham and E. Hammer-Lahav. Defining Well-Known Uniform Resource Identifiers (URIs). RFC 5785 (Draft Standard), 2010."},{"key":"e_1_3_2_1_21_1","unstructured":"Scholz C. and Machulak M. P. and Maler E. L. OAuth Dynamic Client Registration Protocol. http:\/\/tools.ietf.org\/html\/draft-oauth-dyn-reg. Accessed 29\/09\/2010.  Scholz C. and Machulak M. P. and Maler E. L. OAuth Dynamic Client Registration Protocol. http:\/\/tools.ietf.org\/html\/draft-oauth-dyn-reg. Accessed 29\/09\/2010."}],"event":{"name":"Middleware '10: 11th International Middleware Conference","sponsor":["Professional","USENIX Assoc USENIX Assoc","IFIP"],"location":"Bangalore India","acronym":"Middleware '10"},"container-title":["Proceedings of the 5th International Workshop on Middleware for Service Oriented Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1890912.1890913","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1890912.1890913","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:40Z","timestamp":1750244380000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1890912.1890913"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,11,29]]},"references-count":21,"alternative-id":["10.1145\/1890912.1890913","10.1145\/1890912"],"URL":"https:\/\/doi.org\/10.1145\/1890912.1890913","relation":{},"subject":[],"published":{"date-parts":[[2010,11,29]]},"assertion":[{"value":"2010-11-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}