{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:18:42Z","timestamp":1730222322410,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/fmec.2017.7946406","type":"proceedings-article","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T18:36:04Z","timestamp":1497551764000},"page":"45-49","source":"Crossref","is-referenced-by-count":5,"title":["Authentication proxy as a service"],"prefix":"10.1109","author":[{"given":"Jacques Bou","family":"Abdo","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Windows","year":"0","key":"ref10"},{"journal-title":"Passgo","year":"0","key":"ref11"},{"journal-title":"Hitachi ID Management Suite","year":"0","key":"ref12"},{"journal-title":"UK e-Science All Hands Meeting","article-title":"Grid Single Sign-On in CCLRC","year":"2006","author":"jensen","key":"ref13"},{"journal-title":"Shibboleth","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-011-9195-y"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"first-page":"3024","article-title":"Operator Centric Mobile Cloud Architecture","year":"0","author":"bou abdo","key":"ref17"},{"article-title":"Single-Sign-on in Operator Centric Mobile Cloud Architecture","year":"0","author":"bou abdo","key":"ref18"},{"journal-title":"QUALCOMM White Paper","article-title":"Latency in HSPA Data Networks","year":"2011","author":"mohan","key":"ref19"},{"journal-title":"Password Safe","year":"0","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33331-1_2"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45831-X_4"},{"journal-title":"SafeInCloud Password Manager","year":"0","key":"ref5"},{"journal-title":"Passport","year":"0","key":"ref8"},{"article-title":"RFC 4120: The Kerberos network authentication service (V5)","year":"0","author":"neuman","key":"ref7"},{"key":"ref2","first-page":"55","article-title":"Fog Computing Future of Cloud Computing","volume":"4","author":"shenoy","year":"2015","journal-title":"International Journal of Science and Research"},{"journal-title":"Efficient and secure mobile cloud networking","year":"2014","author":"bou abdo","key":"ref1"},{"journal-title":"Entrust","year":"0","key":"ref9"},{"journal-title":"LTE 'Real World' Performance Study Broadband and Voice over LTE (VoLTE) Quality Analysis TeliaSonera","year":"2011","key":"ref20"},{"journal-title":"Oauth","year":"0","key":"ref21"}],"event":{"name":"2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)","start":{"date-parts":[[2017,5,8]]},"location":"Valencia, Spain","end":{"date-parts":[[2017,5,11]]}},"container-title":["2017 Second International Conference on Fog and Mobile Edge Computing (FMEC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7939243\/7946388\/07946406.pdf?arnumber=7946406","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,12]],"date-time":"2017-07-12T00:14:42Z","timestamp":1499818482000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7946406\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/fmec.2017.7946406","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}