{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:05Z","timestamp":1750307285441,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T00:00:00Z","timestamp":1280707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,8,2]]},"DOI":"10.1145\/1941530.1941532","type":"proceedings-article","created":{"date-parts":[[2011,2,15]],"date-time":"2011-02-15T18:31:03Z","timestamp":1297794663000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Introducing a cross federation identity solution for converged network environments"],"prefix":"10.1145","author":[{"given":"Konstantinos","family":"Lampropoulos","sequence":"first","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Daniel","family":"Diaz-Sanchez","sequence":"additional","affiliation":[{"name":"University Carlos III of Madrid, Madrid, Spain"}]},{"given":"Florina","family":"Almenares","sequence":"additional","affiliation":[{"name":"University Carlos III of Madrid, Madrid, Spain"}]},{"given":"Peter","family":"Weik","sequence":"additional","affiliation":[{"name":"Fraunhofer FOKUS, Berlin, Germany"}]},{"given":"Spyros","family":"Denazis","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]}],"member":"320","published-online":{"date-parts":[[2010,8,2]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Focus Group on Identity Management \"Report on Identity Management Use Cases and Gap Analysis\" ITU-T 2008.  Focus Group on Identity Management \"Report on Identity Management Use Cases and Gap Analysis\" ITU-T 2008."},{"key":"e_1_3_2_1_2_1","volume-title":"Liberty ID-FF architecture overview, version 1.2","author":"Liberty Alliance","year":"2004","unstructured":"Liberty Alliance , Liberty ID-FF architecture overview, version 1.2 , 2004 --09. Liberty Alliance, Liberty ID-FF architecture overview, version 1.2, 2004--09."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/openid.net\/specs\/openid-authentication-2_0\/html.  http:\/\/openid.net\/specs\/openid-authentication-2_0\/html."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/informationcard.net\/technical-information-center  http:\/\/informationcard.net\/technical-information-center"},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/www.eclipse.org\/higgins  http:\/\/www.eclipse.org\/higgins"},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/www.ist-daidalos.org  http:\/\/www.ist-daidalos.org"},{"key":"e_1_3_2_1_7_1","unstructured":"http:\/\/www.ist-swift.org  http:\/\/www.ist-swift.org"},{"key":"e_1_3_2_1_8_1","unstructured":"https:\/\/www.prime-project.eu  https:\/\/www.prime-project.eu"},{"key":"e_1_3_2_1_9_1","unstructured":"http:\/\/www.primelife.eu  http:\/\/www.primelife.eu"},{"key":"e_1_3_2_1_10_1","unstructured":"https:\/\/spaces.internet2.edu\/display\/SHIB2\/Home  https:\/\/spaces.internet2.edu\/display\/SHIB2\/Home"},{"key":"e_1_3_2_1_11_1","unstructured":"http:\/\/www.athensams.net\/  http:\/\/www.athensams.net\/"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456424.1456438"},{"key":"e_1_3_2_1_13_1","unstructured":"ETSI EG 284 004 v1.1.2 Universal Communications Identifier (UCI) http:\/\/ftp3.itu.ch\/fgidm\/Deliverables\/0295-att-1.doc  ETSI EG 284 004 v1.1.2 Universal Communications Identifier (UCI) http:\/\/ftp3.itu.ch\/fgidm\/Deliverables\/0295-att-1.doc"},{"key":"e_1_3_2_1_14_1","unstructured":"http:\/\/kantarainitiative.org\/  http:\/\/kantarainitiative.org\/"},{"key":"e_1_3_2_1_15_1","unstructured":"http:\/\/www.networkworld.com\/newsletters\/dir\/2009\/062209id2.html  http:\/\/www.networkworld.com\/newsletters\/dir\/2009\/062209id2.html"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"key":"e_1_3_2_1_17_1","volume-title":"Technical Comparison: OpenID and SAML - Draft 06. {Online}","author":"Hodges","year":"2009","unstructured":"J. Hodges . ( 2009 ) Technical Comparison: OpenID and SAML - Draft 06. {Online} . http:\/\/identitymeme.org\/doc\/draft-hodges-saml-openid-compare.html J. Hodges. (2009) Technical Comparison: OpenID and SAML - Draft 06. {Online}. http:\/\/identitymeme.org\/doc\/draft-hodges-saml-openid-compare.html"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.50"},{"key":"e_1_3_2_1_19_1","volume-title":"Trust Models Guidelines. {Online}","author":"Boeyen G.","year":"2004","unstructured":"S. Boeyen , G. Ellison , N. Karhuluoma , W. MacGregor , P. Madsen , S. Sengodan , J. Linn (Ed). ( 2004 ) Trust Models Guidelines. {Online} . http:\/\/www.oasis-open.org\/committees\/download.php\/6158\/sstc-saml-trustmodels-2.0-draft-01.pdf S. Boeyen, G. Ellison, N. Karhuluoma, W. MacGregor, P. Madsen, S. Sengodan, J. Linn (Ed). (2004) Trust Models Guidelines. {Online}. http:\/\/www.oasis-open.org\/committees\/download.php\/6158\/sstc-saml-trustmodels-2.0-draft-01.pdf"},{"key":"e_1_3_2_1_20_1","volume-title":"Wireless and Mobile Networking Conference","author":"Florina Almenarez Mendoza","year":"2009","unstructured":"Florina Almenarez Mendoza , Andres Marin Lopez and Daniel Diaz Sanchez Patricia Arias Cabarcos, \"Enabling SAML for Dynamic Identity Federation Management,\" in Wireless and Mobile Networking Conference , Gdansk , 2009 . Florina Almenarez Mendoza, Andres Marin Lopez and Daniel Diaz Sanchez Patricia Arias Cabarcos, \"Enabling SAML for Dynamic Identity Federation Management,\" in Wireless and Mobile Networking Conference, Gdansk, 2009."},{"key":"e_1_3_2_1_21_1","volume-title":"OpenID Provider Authentication Policy Extension 1.0. {Online}","author":"Jones M.","year":"2009","unstructured":"D., Jones , M. , Bufu , J. , Daugherty , J. and Sakimura , N Recordon . ( 2009 ) OpenID Provider Authentication Policy Extension 1.0. {Online} . http:\/\/www.openid.net D., Jones, M., Bufu, J., Daugherty, J. and Sakimura, N Recordon. (2009) OpenID Provider Authentication Policy Extension 1.0. {Online}. http:\/\/www.openid.net"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871796"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216016.1216025"},{"key":"e_1_3_2_1_24_1","volume-title":"de Leeuw","author":"Takane Y.","year":"1977","unstructured":"Takane , Y. , Young , F. W. , de Leeuw , J. : Nonmetric individual di\u00aeerences multidimensional scaling: an alternating least squares method with optimal scaling features. In : Psychometrika 42. ( 1977 ) Takane, Y., Young, F. W., de Leeuw, J.: Nonmetric individual di\u00aeerences multidimensional scaling: an alternating least squares method with optimal scaling features. In: Psychometrika 42. (1977)"},{"key":"e_1_3_2_1_25_1","volume-title":"Advances in Neural Information Processing Systems","author":"Platt J. C.","year":"2004","unstructured":"Platt , J. C. : Fast embedding of sparse music similarity . In: Advances in Neural Information Processing Systems vol. 16 . ( 2004 ) Platt, J. C.: Fast embedding of sparse music similarity. In: Advances in Neural Information Processing Systems vol. 16. (2004)"},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Context awareness in network selection for dynamic environments","volume":"36","author":"D\u00edaz S\u00e1nchez D., A.","year":"2007","unstructured":"D\u00edaz S\u00e1nchez , D., A. Mar\u00edn L\u00f3pez , F. Almen\u00e1rez Mendoza , C. Campo V\u00e1zquez , and C. Garc\u00eda-Rubio . \" Context awareness in network selection for dynamic environments .\" Journal\/Magazine: Telecommunication Systems. Vol: 36 . Issue: 1 ( 2007 ): Pages:49--60 D\u00edaz S\u00e1nchez, D., A. Mar\u00edn L\u00f3pez, F. Almen\u00e1rez Mendoza, C. Campo V\u00e1zquez, and C. Garc\u00eda-Rubio. \"Context awareness in network selection for dynamic environments.\" Journal\/Magazine: Telecommunication Systems. Vol:36. Issue: 1 (2007): Pages:49--60","journal-title":"Journal\/Magazine: Telecommunication Systems."},{"key":"e_1_3_2_1_27_1","volume-title":"Infoscale","author":"Yan He A","year":"2007","unstructured":"Yan He and Miaoling Zhu. \" A complete and efficient strategy based on petri net in automated trust negotiation \". Infoscale , June 2007 . Yan He and Miaoling Zhu. \"A complete and efficient strategy based on petri net in automated trust negotiation\". Infoscale, June 2007."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102128"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102129"}],"event":{"name":"IPTComm '10: Principles, Systems and Applications of IP Telecommunications","sponsor":["Technische Universitat Munchen Technische Universitat Munchen","IFIP","SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Munich Germany","acronym":"IPTComm '10"},"container-title":["Principles, Systems and Applications of IP Telecommunications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941532","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1941530.1941532","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:35Z","timestamp":1750244375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1941530.1941532"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,2]]},"references-count":29,"alternative-id":["10.1145\/1941530.1941532","10.1145\/1941530"],"URL":"https:\/\/doi.org\/10.1145\/1941530.1941532","relation":{},"subject":[],"published":{"date-parts":[[2010,8,2]]},"assertion":[{"value":"2010-08-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}