{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T15:47:39Z","timestamp":1725464859237},"publisher-location":"Boston","reference-count":21,"publisher":"Kluwer Academic Publishers","isbn-type":[{"type":"print","value":"1402081545"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8155-3_18","type":"book-chapter","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T22:56:17Z","timestamp":1147128977000},"page":"329-342","source":"Crossref","is-referenced-by-count":0,"title":["Identity-Enriched Session Management"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Baier","sequence":"first","affiliation":[]},{"given":"Christian P.","family":"Kunze","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Abdelal, R. and Herrera, Y. M. (2001). treating identity as a variable: measuring the content, intensity, and contestation of identity. Technical report, Harvard Business School."},{"key":"18_CR2","first-page":"815","volume":"2","author":"T. Baier","year":"2003","unstructured":"Baier, T., Zirpins, C., and Lamersdorf, W. (2003). Digital identity: How to be someone on the net. In Proceedings of the IADIS International Conference of e-Society, volume 2, pages 815\u2013820.","journal-title":"Proceedings of the IADIS International Conference of e-Society"},{"key":"18_CR3","unstructured":"Berthold, O. and K\u00f6hntopp, M. (2000). Identity management based on p3p. In Workshop on Design Issues in Anonymity and Unobservability."},{"key":"18_CR4","unstructured":"Brockhaus, F. A. (1989). BROCKHAUS ENZYKLOP\u00c4DIE in vierundzwanzig B\u00e4nden: Zw\u00f6lfter Band Kir-LAG."},{"key":"18_CR5","first-page":"205","volume-title":"Computer Networks 37 (2001)","author":"S. Clau\u00df","year":"2001","unstructured":"Clau\u00df, S. and K\u00f6hntopp, M. (2001). Identity Management and Its Support for Multilateral Security. In Computer Networks 37 (2001), special issue on electronic business systems, Elsevier, North-Holland 2001, pages 205\u2013219."},{"key":"18_CR6","unstructured":"Debatin, B. (1996). Elektronische \u00d6ffentlichkeiten. \u00dcber Informationsselektion und Identit\u00e4t in virtuellen Gemeinschaften. web-site. \n http:\/\/www.unileipzig.de\/~debatin\/english\/Articles\/Fiff.htm\n \n ."},{"key":"18_CR7","unstructured":"Donath, J. S. (1996). Identity and deception in virtual community. Technical report, MIT Media Lab."},{"key":"18_CR8","unstructured":"D\u00f6ring, N. (1999). Sozialpsychologie des Internet. Hogrefe. Identity-Enriched Session Management 13"},{"issue":"3","key":"18_CR9","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s001150101110","volume":"73","author":"T. Fuchs","year":"2002","unstructured":"Fuchs, T. (2002). Der Begriff der Person in der Psychiatrie. Der Nervenarzt, 73(3):239\u2013246.","journal-title":"Der Nervenarzt"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Griffel, F., Boger, M., Weinreich, H., Lamersdorf, W., and Merz, M. (1998). Electronic contracting with cosmos-how to establish, negotiate and execute electronic contracts on the internet. In C. Kobryn, C. Atkinson, Z. M., editor, 2nd Int. Enterprise Distributed Object Computing Workshop (EDOC\u2019 98), page 10. IEEE.","DOI":"10.1109\/EDOC.1998.723241"},{"issue":"Winter","key":"18_CR11","first-page":"54","volume":"1","author":"D. Henrisch","year":"1976","unstructured":"Henrisch, D. (1976). Identit\u00e4t und Objektivit\u00e4t: eine Untersuchung \u00fcber Kants transzendentale Deduktion. In Sitzungsberichte der Heidelberger Akademie derWissenschaften-Philosophisch-Historische Klasse, volume 1, page 54 et sqq. Winter.","journal-title":"Sitzungsberichte der Heidelberger Akademie derWissenschaften-Philosophisch-Historische Klasse"},{"key":"18_CR12","unstructured":"Jendricke, U., Gerd tom Markotten, D. (2001). Usability meets security-the Identity Manager as your personal security assistant for the internet. In Proceedings of the 16\n th annual Computer Security Applications Conference, pages 344\u2013353."},{"key":"18_CR13","unstructured":"Koch, M. and W\u00f6rndl, W (2001). Community Support and Identity Management. In: Proc. European Conf. on Computer Supported Cooperative Work (ECSCW 2001), Bonn, Germany, pages 319\u2013338."},{"key":"18_CR14","unstructured":"Kunze, C. P. (2004). Digitale Identit\u00e4t und Identit\u00e4ts-Management. Informatiktage 2003."},{"issue":"76es","key":"18_CR15","first-page":"24","volume":"2000","author":"R. M. Lerner","year":"2000","unstructured":"Lerner, R. M. (2000). At the forge: Session management with mason. Linux Journal, 2000(76es):24.","journal-title":"Linux Journal"},{"key":"18_CR16","unstructured":"Mittelstra\u00df, J. (1984). Enzyklop\u00e4die Philosophie und Wissenschaftstheorie 2. Wissenschaftsverlag."},{"issue":"2","key":"18_CR17","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s002780050105","volume":"43","author":"F. Resch","year":"1998","unstructured":"Resch, F. (1998). Zur pr\u00e4psychotischen Pers\u00f6nlichkeitsentwicklung in der Adoleszenz. Psychotherapeut, 43(2): 111\u2013116.","journal-title":"Psychotherapeut"},{"key":"18_CR18","unstructured":"Sprenger, P. (1999). Sun on privacy: Get over it."},{"key":"18_CR19","unstructured":"Suler, J. (1996). Identity Management in Cyberspace. web-site. \n http:\/\/www.rider.edu\/users\/suler\/psycyber\/identitymanage.html\n \n , 06.10.2002."},{"key":"18_CR20","unstructured":"Turkle, S. (1999). Leben im Netz: Identit\u00e4t in Zeiten des Internet. Rohwolt Taschenbuch Verlag."},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Zirpins, C., Lamersdorf, W., and Piccinelli, G. (2004). A service oriented approach to interorganisational cooperation. In M. Mendes, R. Suomi, C. P., editor, Digital Communities in a Networked Society: eCommerce, eBusiness, and eGovernment. Kluwer Academic Publishers.","DOI":"10.1007\/1-4020-7907-9_24"}],"container-title":["IFIP International Federation for Information Processing","Building the E-Service Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8155-3_18.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:29:02Z","timestamp":1619555342000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8155-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402081545"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8155-3_18","relation":{},"subject":[]}}