iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1007/978-3-642-10485-5_7
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:55:06Z","timestamp":1725540906287},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642104848"},{"type":"electronic","value":"9783642104855"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10485-5_7","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T02:23:22Z","timestamp":1258079002000},"page":"90-107","source":"Crossref","is-referenced-by-count":4,"title":["Performance Evaluation of Identity and Access Management Systems in Federated Environments"],"prefix":"10.1007","author":[{"given":"Frank","family":"Schell","sequence":"first","affiliation":[]},{"given":"Jochen","family":"Dinger","sequence":"additional","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/1216993.1217006","volume-title":"Proceedings of the 6th international workshop on Software and performance","author":"S. Becker","year":"2007","unstructured":"Becker, S., Koziolek, H., Reussner, R.: Model-based performance prediction with the palladio component model. In: Proceedings of the 6th international workshop on Software and performance, pp. 54\u201365. ACM, New York (2007)"},{"volume-title":"Access control systems: security, identity management and trust models","year":"2006","author":"M. Benantar","key":"7_CR2","unstructured":"Benantar, M.: Access control systems: security, identity management and trust models. Springer, Heidelberg (2006)"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/s10550-006-0011-3","volume":"23","author":"I. Djordjevic","year":"2005","unstructured":"Djordjevic, I., Dimitrakos, T.: A note on the anatomy of federation. BT Technology Journal\u00a023(4), 89\u2013106 (2005)","journal-title":"BT Technology Journal"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"H\u00f6llrigl, T., Schell, F., Suelmann, S., Hartenstein, H.: Towards systematic engineering of Service-Oriented access control in federated environments. In: IEEE Congress on Services Part II, SERVICES-2., pp. 104\u2013111 (2008)","DOI":"10.1109\/SERVICES-2.2008.24"},{"key":"7_CR5","unstructured":"J\u00f8sang, A., Pope, S.: User centric identity management. In: Proceedings of AusCERT Asia Pacific Information Technology Security Conference, pp. 77\u201389 (2005)"},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/S1389-1286(00)00048-7","volume":"33","author":"D. Kormann","year":"2000","unstructured":"Kormann, D., Rubin, A.: Risks of the passport single signon protocol. Computer Networks\u00a033, 51\u201358 (2000)","journal-title":"Computer Networks"},{"key":"7_CR7","unstructured":"Liberty alliance project (2009), http:\/\/www.projectliberty.org\/"},{"issue":"7","key":"7_CR8","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1016\/j.cose.2004.06.013","volume":"23","author":"J. Lopez","year":"2004","unstructured":"Lopez, J., Oppliger, R., Pernul, G.: Authentication and authorization infrastructures (AAIs): a comparative survey. Computers & Security\u00a023(7), 578\u2013590 (2004)","journal-title":"Computers & Security"},{"issue":"2","key":"7_CR9","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2008.50","volume":"6","author":"E. Maler","year":"2008","unstructured":"Maler, E., Reed, D.: The venn of identity: Options and issues in federated identity management. IEEE Security & Privacy\u00a06(2), 16\u201323 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"7_CR10","unstructured":"Mont, M., Baldwin, A., Griffin, J., Shiu, S.: Towards Identity Analytics in Enterprises. To Appear: Proceeding of the 24th IFIP International Information Security Conference (2009)"},{"key":"7_CR11","unstructured":"Passport (2009), https:\/\/accountservices.passport.net\/ppnetworkhome.srf"},{"key":"7_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/11542322_20","volume-title":"Security Protocols","author":"B. Pfitzmann","year":"2005","unstructured":"Pfitzmann, B., Waidner, M.: Federated identity-management protocols. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2003. LNCS, vol.\u00a03364, pp. 153\u2013174. Springer, Heidelberg (2005)"},{"key":"7_CR13","unstructured":"Ping Identity. Federated Provisioning: The Synergy of Identity Federation and User Provisioning, http:\/\/www.pingidentity.com\/information-library\/resource-details.cfm?customel_datapageid_1296=7587"},{"issue":"2","key":"7_CR14","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/2.485845","volume":"29","author":"R. Sandhu","year":"1996","unstructured":"Sandhu, R., Coyne, E., Feinstein, H., Youman, C.: Role-based access control models. Computer\u00a029(2), 38\u201347 (1996)","journal-title":"Computer"},{"issue":"1","key":"7_CR15","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1524\/itit.2009.0518","volume":"51","author":"F. Schell","year":"2009","unstructured":"Schell, F., H\u00f6llrigl, T., Hartenstein, H.: Federated Identity Management as a Basis for Integrated Information Management. it-Information Technology\u00a051(1), 14\u201323 (2009)","journal-title":"it-Information Technology"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Schl\u00e4ger, C., Ganslmayer, M.: Effects of Architectural Decisions in Authentication and Authorisation Infrastructures. In: The Second International Conference on Availability, Reliability and Security, ARES 2007, pp. 230\u2013237 (2007)","DOI":"10.1109\/ARES.2007.75"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Schl\u00e4ger, C., Nowey, T., Montenegro, J.: A Reference Model for Authentication and Authorisation Infrastructures Respecting Privacy and Flexibility in b2c eCommerce. In: Proceedings of the First International Conference on Availability, Reliability and Security, pp. 709\u2013716 (2006)","DOI":"10.1109\/ARES.2006.13"},{"key":"7_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"306","DOI":"10.1007\/11545163_31","volume-title":"E-Commerce and Web Technologies","author":"C. Schl\u00e4ger","year":"2005","unstructured":"Schl\u00e4ger, C., Pernul, G.: Authentication and Authorisation Infrastructures in b2c e-Commerce. In: Bauknecht, K., Pr\u00f6ll, B., Werthner, H. (eds.) EC-Web 2005. LNCS, vol.\u00a03590, pp. 306\u2013315. Springer, Heidelberg (2005)"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Shen, H., Hong, F.: An attribute-based access control model for web services. In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies, PDCAT 2006, pp. 74\u201379 (2006)","DOI":"10.1109\/PDCAT.2006.28"},{"key":"7_CR20","unstructured":"Shibboleth (2009), http:\/\/shibboleth.internet2.edu\/"},{"volume-title":"Inside microsoft windows communication foundation","year":"2007","author":"J. Smith","key":"7_CR21","unstructured":"Smith, J.: Inside microsoft windows communication foundation. Microsoft Press, Redmond (2007)"},{"key":"7_CR22","unstructured":"Wilson, E.: An introduction to scientific research. Courier Dover Publications (1990)"},{"key":"7_CR23","unstructured":"OASIS eXtensible Access Control Markup Language, XACML (2009), http:\/\/www.oasis-open.org\/committees\/tc_home.php?wg_abbrev=xacml"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Yavatkar, R., Pendarakis, D., Guerin, R.: A Framework for Policy-based Admission Control. RFC 2753, Informational (2000)","DOI":"10.17487\/rfc2753"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Yuan, E., Tong, J., Inc, B., McLean, V.: Attributed based access control (ABAC) for Web services. In: 2005 IEEE International Conference on Web Services, ICWS 2005. Proceedings, pp. 561\u2013569 (2005)","DOI":"10.1109\/ICWS.2005.25"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Scalable Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10485-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T16:31:42Z","timestamp":1558629102000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10485-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642104848","9783642104855"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10485-5_7","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2009]]}}}