{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T14:32:42Z","timestamp":1768487562990,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,25]],"date-time":"2012-06-25T00:00:00Z","timestamp":1340582400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,25]]},"DOI":"10.1145\/2304656.2304659","type":"proceedings-article","created":{"date-parts":[[2012,6,27]],"date-time":"2012-06-27T13:31:21Z","timestamp":1340803881000},"page":"11-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluating identity management architectures"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Staite","sequence":"first","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]},{"given":"Rami","family":"Bahsoon","sequence":"additional","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2012,6,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2008.07.001"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/11861386_4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.116"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IAS.2008.67"},{"key":"e_1_3_2_1_5_1","unstructured":"Cormac Herley and Paul C. van Oorschot. A research agenda acknowledging the persistence of passwords. Security & Privacy IEEE (99).   Cormac Herley and Paul C. van Oorschot. A research agenda acknowledging the persistence of passwords. Security & Privacy IEEE (99)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302452"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/827275.829350"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2009.41"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/644527.644533"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Thomas L. Saaty. How to make a decision: the analytic hierarchy process. European journal of operational research 48(1):9--26 1990.  Thomas L. Saaty. How to make a decision: the analytic hierarchy process. European journal of operational research 48(1):9--26 1990.","DOI":"10.1016\/0377-2217(90)90057-I"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1712605.1712648"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1385109.1385125"}],"event":{"name":"Comparch '12: Federated Events on Component-Based Software Engineering and Software Architecture","location":"Bertinoro Italy","acronym":"Comparch '12","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2304656.2304659","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2304656.2304659","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:47Z","timestamp":1750236527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2304656.2304659"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,25]]},"references-count":12,"alternative-id":["10.1145\/2304656.2304659","10.1145\/2304656"],"URL":"https:\/\/doi.org\/10.1145\/2304656.2304659","relation":{},"subject":[],"published":{"date-parts":[[2012,6,25]]},"assertion":[{"value":"2012-06-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}