{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T17:07:56Z","timestamp":1774112876175,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T00:00:00Z","timestamp":1566777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-sa\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["825075"],"award-info":[{"award-number":["825075"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100007601","name":"Horizon 2020","doi-asserted-by":"publisher","award":["723810"],"award-info":[{"award-number":["723810"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,26]]},"DOI":"10.1145\/3339252.3341492","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Federated Identity Management and Interoperability for Heterogeneous Cloud Platform Ecosystems"],"prefix":"10.1145","author":[{"given":"Nirojan","family":"Selvanathan","sequence":"first","affiliation":[{"name":"IoT Group, Salzburg Research, Salzburg Austria"}]},{"given":"Dileepa","family":"Jayakody","sequence":"additional","affiliation":[{"name":"IoT Group, Salzburg Research, Salzburg Austria"}]},{"given":"Violeta","family":"Damjanovic-Behrendt","sequence":"additional","affiliation":[{"name":"IoT Group, Salzburg Research, Salzburg Austria"}]}],"member":"320","published-online":{"date-parts":[[2019,8,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"H2020 FoF-11-2016 eFactory (European Connected Factory Platform for Agile Manufacturing) project website: https:\/\/www.efactory-project.eu\/  H2020 FoF-11-2016 eFactory (European Connected Factory Platform for Agile Manufacturing) project website: https:\/\/www.efactory-project.eu\/"},{"key":"e_1_3_2_1_2_1","first-page":"82","volume-title":"An Overview of Cloud Identity Management-Models. In Proceedings of the 10th International Conf. on Web Information Systems and Technologies (WEBIST)","author":"Zwattendorfer B."},{"key":"e_1_3_2_1_3_1","unstructured":"A. J\u00f8sang and S. Pope 2005. User centric identity management. AusCERT'05.  A. J\u00f8sang and S. Pope 2005. User centric identity management. AusCERT'05."},{"key":"e_1_3_2_1_4_1","volume-title":"Identity Management: Concepts, Technologies, and Systems","author":"Bertino E.","year":"2011"},{"key":"e_1_3_2_1_5_1","first-page":"287","volume-title":"Proceedings of the IEEE ICITIS","author":"Cao Y.","year":"2010"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"C. Neuman T. Yu S. Hartman and K. Raeburn 2005. The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard).  C. Neuman T. Yu S. Hartman and K. Raeburn 2005. The Kerberos Network Authentication Service (V5). RFC 4120 (Proposed Standard).","DOI":"10.17487\/rfc4120"},{"key":"e_1_3_2_1_7_1","unstructured":"M. Dabrowski and P. Pacyna 2008. Overview of Identity Management. Technical report chinacommunications.cn.  M. Dabrowski and P. Pacyna 2008. Overview of Identity Management. Technical report chinacommunications.cn."},{"key":"e_1_3_2_1_8_1","first-page":"391","volume-title":"ACSAC","author":"Leitold H.","year":"2002"},{"key":"e_1_3_2_1_9_1","first-page":"154","volume-title":"Practical Experiences, Technologies","author":"Fromm J."},{"key":"e_1_3_2_1_10_1","series-title":"Berkman Publication Series.","volume-title":"CASE STUDY: Digital Identity Interoperability and e-Innovation","author":"Palfrey J.","year":"2007"},{"key":"e_1_3_2_1_11_1","volume-title":"Web Services Federation Language","author":"Kaler C."},{"key":"e_1_3_2_1_12_1","unstructured":"SAML XML.org. Website: http:\/\/saml.xml.org\/  SAML XML.org. Website: http:\/\/saml.xml.org\/"},{"key":"e_1_3_2_1_13_1","volume-title":"Online available from: https:\/\/www.shibboleth.net\/products\/identity-provider\/ (accessed","author":"Shibboleth Consortium Website.","year":"2019"},{"key":"e_1_3_2_1_14_1","article-title":"Towards an Interoperable Identity Management Framework: A Comparative Study","volume":"12","author":"Haddouti S.E.","year":"2015","journal-title":"International Journal of Computer Science Issues (IJCSI)"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.85"},{"key":"e_1_3_2_1_16_1","unstructured":"Cloud Security Alliance 2011. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. CSA  Cloud Security Alliance 2011. Security Guidance for Critical Areas of Focus in Cloud Computing V3.0. CSA"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSS.2010.46"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40160-2_5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2012.6427551"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-014-0230-4"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72738-5_19"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"e_1_3_2_1_24_1","unstructured":"SOCIoTAL 2014. D2.2 Framework Specification for Privacy and Access Control. Online: http:\/\/bit.ly\/2B8HeB8  SOCIoTAL 2014. D2.2 Framework Specification for Privacy and Access Control. Online: http:\/\/bit.ly\/2B8HeB8"}],"event":{"name":"ARES '19: 14th International Conference on Availability, Reliability and Security","location":"Canterbury CA United Kingdom","acronym":"ARES '19"},"container-title":["Proceedings of the 14th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341492","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3339252.3341492","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:54:29Z","timestamp":1750204469000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3339252.3341492"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,26]]},"references-count":23,"alternative-id":["10.1145\/3339252.3341492","10.1145\/3339252"],"URL":"https:\/\/doi.org\/10.1145\/3339252.3341492","relation":{},"subject":[],"published":{"date-parts":[[2019,8,26]]},"assertion":[{"value":"2019-08-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}