{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:18Z","timestamp":1750307118078,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T00:00:00Z","timestamp":1319155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,21]]},"DOI":"10.1145\/2046642.2046658","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"73-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Behavioral biometrics for persistent single sign-on"],"prefix":"10.1145","author":[{"given":"Tarik","family":"Mustafi\u0107","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Berlin - DAI-Labor, Berlin, Germany"}]},{"given":"Arik","family":"Messerman","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - DAI-Labor, Berlin, Germany"}]},{"given":"Seyit Ahmet","family":"Camtepe","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - DAI-Labor, Berlin, Germany"}]},{"given":"Aubrey-Derrick","family":"Schmidt","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - DAI-Labor, Berlin, Germany"}]},{"given":"Sahin","family":"Albayrak","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Berlin - DAI-Labor, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2011,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"NGN Identity Management Framework.  NGN Identity Management Framework."},{"key":"e_1_3_2_1_2_1","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"Anderson R.","year":"2001","unstructured":"R. Anderson . Security Engineering: A Guide to Building Dependable Distributed Systems , volume 1 . Wiley & Sons , apr 2001 . R. Anderson. Security Engineering: A Guide to Building Dependable Distributed Systems, volume 1. Wiley & Sons, apr 2001."},{"key":"e_1_3_2_1_3_1","volume-title":"Access Control Systems: Security, Identity Management and Trust Models","author":"Benantar M.","year":"2005","unstructured":"M. Benantar . Access Control Systems: Security, Identity Management and Trust Models . Springer-Verlag New York, Inc. , Secaucus, NJ, USA , 2005 . M. Benantar. Access Control Systems: Security, Identity Management and Trust Models. Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2005."},{"key":"e_1_3_2_1_4_1","first-page":"978","article-title":"Identity Management - Concepts, Technologies, and Systems","volume":"13","author":"Bertino E.","unstructured":"E. Bertino and K. Takahashi . Identity Management - Concepts, Technologies, and Systems . Number ISBN 13 : 978 - 971 -60807-039-8. ARTECH HOUSE, 2011. E. Bertino and K. Takahashi. Identity Management - Concepts, Technologies, and Systems. Number ISBN 13: 978-1-60807-039-8. ARTECH HOUSE, 2011.","journal-title":"Number ISBN"},{"key":"e_1_3_2_1_5_1","volume-title":"International Conference on, 2: 2831","author":"Bolle R. M.","year":"2000","unstructured":"R. M. Bolle , S. Pankanti , and N. K. Ratha . Evaluation Techniques for Biometrics-Based Authentication Systems (FRR). Pattern Recognition , International Conference on, 2: 2831 , 2000 . R. M. Bolle, S. Pankanti, and N. K. Ratha. Evaluation Techniques for Biometrics-Based Authentication Systems (FRR). Pattern Recognition, International Conference on, 2:2831, 2000."},{"key":"e_1_3_2_1_6_1","volume-title":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik","author":"\u00fcr Bundesamt","year":"2010","unstructured":"Bundesamt f \u00fcr Sicherheit in der Informationstechnik. SOA-Security-Kompendium 2.0 . Bundesamt f\u00fcr Sicherheit in der Informationstechnik , 2010 . Bundesamt f\u00fcr Sicherheit in der Informationstechnik. SOA-Security-Kompendium 2.0. Bundesamt f\u00fcr Sicherheit in der Informationstechnik, 2010."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11751632_44"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IIHMSP.2010.83"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085126.1085129"},{"key":"e_1_3_2_1_10_1","volume-title":"ENISA Briefing: Behavioural Biometrics. Technical report","author":"Hogben G.","year":"2010","unstructured":"G. Hogben . ENISA Briefing: Behavioural Biometrics. Technical report , European Network and Information Security Agency (ENISA) , 2010 . G. Hogben. ENISA Briefing: Behavioural Biometrics. Technical report, European Network and Information Security Agency (ENISA), 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.818349"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/11915072_39"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30121-9_86"},{"key":"e_1_3_2_1_14_1","volume-title":"Presentation","author":"Takahashi Kenji","year":"2007","unstructured":"Kenji Takahashi . SASSO : Personal Identity Provider on Mobile Phone . Presentation , 2007 . Kenji Takahashi. SASSO: Personal Identity Provider on Mobile Phone. Presentation, 2007."},{"key":"e_1_3_2_1_15_1","first-page":"11","article-title":"Generic Framework and Runtime Environment for Development and Evaluation of Behavioral Biometrics Solutions. In IEEE The 10th International Conference on Intelligent System Design and Applications (ISDA 2010), pages 136--141, Cairo","author":"Messerman A.","year":"2010","unstructured":"A. Messerman , T. Mustafi\u0107 , S. A. Camtepe , and S. Albayrak . Generic Framework and Runtime Environment for Development and Evaluation of Behavioral Biometrics Solutions. In IEEE The 10th International Conference on Intelligent System Design and Applications (ISDA 2010), pages 136--141, Cairo , Egypt , 11 2010 . ISBN: 978-1-4244-8135-4. A. Messerman, T. Mustafi\u0107, S. A. Camtepe, and S. Albayrak. Generic Framework and Runtime Environment for Development and Evaluation of Behavioral Biometrics Solutions. In IEEE The 10th International Conference on Intelligent System Design and Applications (ISDA 2010), pages 136--141, Cairo, Egypt, 11 2010. ISBN: 978-1-4244-8135-4.","journal-title":"Egypt"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCB.2011.6117552"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1706428.1706455"},{"key":"e_1_3_2_1_18_1","unstructured":"OASIS Security Services TC. Security Assertion Markup Language (SAML) v2.0. http:\/\/www.oasis-open.org\/standards Mar. 2005.  OASIS Security Services TC. Security Assertion Markup Language (SAML) v2.0. http:\/\/www.oasis-open.org\/standards Mar. 2005."},{"key":"e_1_3_2_1_19_1","volume-title":"Web Services Federation Language","author":"OASIS Web Services Federation (WSFED) TC.","year":"2009","unstructured":"OASIS Web Services Federation (WSFED) TC. Web Services Federation Language ( WS-Federation) v1.2. http:\/\/www.oasis-open.org\/standards, May 2009 . OASIS Standard. OASIS Web Services Federation (WSFED) TC. Web Services Federation Language (WS-Federation) v1.2. http:\/\/www.oasis-open.org\/standards, May 2009. OASIS Standard."},{"key":"e_1_3_2_1_20_1","unstructured":"K. Revett. Behavioral Biometrics. Wiley J 2008. ISBN:  978-0-470-51883-0.  K. Revett. Behavioral Biometrics. Wiley J 2008. ISBN: 978-0-470-51883-0."},{"key":"e_1_3_2_1_21_1","volume-title":"Time-out management in multi-domain single sign-on: A paper highlighting integration issues in single sign-on","author":"Stripe P. A.","year":"2005","unstructured":"P. A. Stripe and A. Shah . Time-out management in multi-domain single sign-on: A paper highlighting integration issues in single sign-on . The Stratta Group , 2005 . P. A. Stripe and A. Shah. Time-out management in multi-domain single sign-on: A paper highlighting integration issues in single sign-on. The Stratta Group, 2005."},{"key":"e_1_3_2_1_22_1","volume-title":"The Liberty Alliance Project","author":"The NTT Group","year":"2007","unstructured":"The NTT Group . Case Study : NTT's SASSO Turns a Mobile Phone into a Personal Identity Provider . The Liberty Alliance Project , 2007 . The NTT Group. Case Study: NTT's SASSO Turns a Mobile Phone into a Personal Identity Provider. The Liberty Alliance Project, 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference - Imprint of: IGI Publishing","author":"Wang L.","year":"2009","unstructured":"L. Wang , X. Geng , L. Wang , and X. Geng . Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference - Imprint of: IGI Publishing , Hershey, PA , 2009 . L. Wang, X. Geng, L. Wang, and X. Geng. Behavioral Biometrics For Human Identification: Intelligent Applications. Information Science Reference - Imprint of: IGI Publishing, Hershey, PA, 2009."},{"key":"e_1_3_2_1_24_1","volume-title":"Morgan Kaufmann Publishers Inc.","author":"Weiser M.","year":"1995","unstructured":"M. Weiser . Human-computer interaction. chapter The computer for the 21st century, pages 933--940 . Morgan Kaufmann Publishers Inc. , San Francisco, CA, USA , 1995 . M. Weiser. Human-computer interaction. chapter The computer for the 21st century, pages 933--940. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1995."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2008.78"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 7th ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046642.2046658","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046642.2046658","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:20Z","timestamp":1750240100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046642.2046658"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,21]]},"references-count":25,"alternative-id":["10.1145\/2046642.2046658","10.1145\/2046642"],"URL":"https:\/\/doi.org\/10.1145\/2046642.2046658","relation":{},"subject":[],"published":{"date-parts":[[2011,10,21]]},"assertion":[{"value":"2011-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}