{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:23Z","timestamp":1750306163741,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T00:00:00Z","timestamp":1465948800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935673","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T21:50:36Z","timestamp":1465595436000},"page":"69-75","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Verification of a Multi-Domain Authentication and Authorization Infrastructure Yamata-no-Orochi"],"prefix":"10.1145","author":[{"given":"Kei","family":"Mikami","sequence":"first","affiliation":[{"name":"Faculty of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]},{"given":"Daisuke","family":"Ando","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]},{"given":"Kunitake","family":"Kaneko","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]},{"given":"Fumio","family":"Teraoka","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"849","article-title":"Yamata-no-Orochi: an Authentication and Authorization Infrastructure for Internet Services (in Japanese)","volume":"55","author":"Atsuya Y.","year":"2014","unstructured":"Y. Atsuya , K. Kaneko , and F. Teraoka . Yamata-no-Orochi: an Authentication and Authorization Infrastructure for Internet Services (in Japanese) . IPSJ Journal , 55 ( 2 ): 849 -- 864 , February 2014 . Y. Atsuya, K. Kaneko, and F. Teraoka. Yamata-no-Orochi: an Authentication and Authorization Infrastructure for Internet Services (in Japanese). IPSJ Journal, 55(2):849--864, February 2014.","journal-title":"IPSJ Journal"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2695664.2696047"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2013.162"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.312841"},{"key":"e_1_3_2_1_5_1","unstructured":"Shibboleth. https:\/\/shibboleth.net.  Shibboleth. https:\/\/shibboleth.net."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOCW.2008.6"},{"key":"e_1_3_2_1_7_1","unstructured":"Internet2. http:\/\/www.internet2.edu.  Internet2. http:\/\/www.internet2.edu."},{"key":"e_1_3_2_1_8_1","unstructured":"Security Assertion Markup Language (SAML). http:\/\/saml.xml.org.  Security Assertion Markup Language (SAML). http:\/\/saml.xml.org."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/NAS.2007.42"},{"key":"e_1_3_2_1_10_1","unstructured":"OpenID Connect. http:\/\/openid.net\/connect\/.  OpenID Connect. http:\/\/openid.net\/connect\/."},{"key":"e_1_3_2_1_11_1","first-page":"219","volume-title":"Proc. of 16th International Conference on e-Health Networking, Applications and Services 2014","author":"Domenech M. C.","year":"2014","unstructured":"M. C. Domenech , E. Comunello , and M. S. Wangham . Identity management in e-Health: A case study of web of things application using OpenID connect . In Proc. of 16th International Conference on e-Health Networking, Applications and Services 2014 , pages 219 -- 224 , Oct 2014 . M. C. Domenech, E. Comunello, and M. S. Wangham. Identity management in e-Health: A case study of web of things application using OpenID connect. In Proc. of 16th International Conference on e-Health Networking, Applications and Services 2014, pages 219--224, Oct 2014."},{"key":"e_1_3_2_1_12_1","unstructured":"OpenID Foundation. http:\/\/openid.net\/foundation\/.  OpenID Foundation. http:\/\/openid.net\/foundation\/."},{"key":"e_1_3_2_1_13_1","unstructured":"OASIS eXtensible Access Control Markup Language (XACML). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html.  OASIS eXtensible Access Control Markup Language (XACML). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html."},{"key":"e_1_3_2_1_14_1","volume-title":"Diameter Base Protocol","author":"Fajardo V.","year":"2012","unstructured":"V. Fajardo , J. Arkko , J. Loughney , and G. Zorn . Diameter Base Protocol , 2012 . RFC 6733. V. Fajardo, J. Arkko, J. Loughney, and G. Zorn. Diameter Base Protocol, 2012. RFC 6733."},{"key":"e_1_3_2_1_15_1","volume-title":"Extensible Authentication Protocol (EAP)","author":"Aboba B.","year":"2004","unstructured":"B. Aboba , L. Blunk , J. Vollbrecht , J. Carlson , and H. Levkowetz . Extensible Authentication Protocol (EAP) , 2004 . RFC 3748. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz. Extensible Authentication Protocol (EAP), 2004. RFC 3748."},{"issue":"4","key":"e_1_3_2_1_16_1","first-page":"114","article-title":"freeDiameter: An Open Source Framework for an Authentication, Authorization, and Accounting Infrastructure","volume":"28","author":"Decugis S.","year":"2011","unstructured":"S. Decugis and F. Teraoka . freeDiameter: An Open Source Framework for an Authentication, Authorization, and Accounting Infrastructure . Computer Software , 28 ( 4 ): 114 -- 125 , 11 2011 . S. Decugis and F. Teraoka. freeDiameter: An Open Source Framework for an Authentication, Authorization, and Accounting Infrastructure. Computer Software, 28(4):114--125, 11 2011.","journal-title":"Computer Software"},{"key":"e_1_3_2_1_17_1","volume-title":"E95-D(2):503--513, 3","author":"Ben Ayed S.","year":"2012","unstructured":"S. Ben Ayed and F. Teraoka . A Multi-Domain Access Control Infrastructure Based on Diameter and EAP. IEICE Transactions on Information and Systems , E95-D(2):503--513, 3 2012 . S. Ben Ayed and F. Teraoka. A Multi-Domain Access Control Infrastructure Based on Diameter and EAP. IEICE Transactions on Information and Systems, E95-D(2):503--513, 3 2012."},{"key":"e_1_3_2_1_18_1","volume-title":"Diameter Extensible Authentication Protocol (EAP) Application","author":"Eronen P.","year":"2005","unstructured":"P. Eronen , T. Hiller , and G. Zorn . Diameter Extensible Authentication Protocol (EAP) Application , 2005 . RFC 4702. P. Eronen, T. Hiller, and G. Zorn. Diameter Extensible Authentication Protocol (EAP) Application, 2005. RFC 4702."},{"key":"e_1_3_2_1_19_1","unstructured":"XMLSec Library. https:\/\/www.aleksey.com\/xmlsec\/.  XMLSec Library. https:\/\/www.aleksey.com\/xmlsec\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Linux WPA Supplicant. https:\/\/w1.fi\/wpa_supplicant\/.  Linux WPA Supplicant. https:\/\/w1.fi\/wpa_supplicant\/."},{"key":"e_1_3_2_1_21_1","unstructured":"The XML C parser and toolkit of Gnome. http:\/\/www.xmlsoft.org.  The XML C parser and toolkit of Gnome. http:\/\/www.xmlsoft.org."}],"event":{"name":"CFI '16: The 11th International Conference on Future Internet Technologies","sponsor":["AsiaFI Asia Future Internet"],"location":"Nanjing China","acronym":"CFI '16"},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935673","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:56Z","timestamp":1750217996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":21,"alternative-id":["10.1145\/2935663.2935673","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935673","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}