{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T03:35:20Z","timestamp":1730259320676,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ict.2017.7998280","type":"proceedings-article","created":{"date-parts":[[2017,8,3]],"date-time":"2017-08-03T20:24:07Z","timestamp":1501791847000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Choice of suitable Identity and Access Management standards for mobile computing and communication"],"prefix":"10.1109","author":[{"given":"Nitin","family":"Naik","sequence":"first","affiliation":[]},{"given":"Paul","family":"Jenkins","sequence":"additional","affiliation":[]},{"given":"David","family":"Newell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MESOCA.2016.9"},{"journal-title":"Introduction to JSON Web Tokens","year":"2015","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2016.7753148"},{"journal-title":"SSO for native mobile applications with WS02 identity server","year":"2014","author":"gunawardana","key":"ref13"},{"key":"ref14","first-page":"138","article-title":"Data confidentiality and integrity in mobile cloud computing","volume":"6","author":"alsulami","year":"2015","journal-title":"Journal of Emerging Trends in Computing and Information Sciences"},{"journal-title":"XML security? issues and requirements","year":"2015","key":"ref15"},{"journal-title":"Critical vulnerabilities in json web token libraries","year":"2015","author":"mclean","key":"ref16"},{"journal-title":"Security Assertion Markup Language (SAML) V2 0 Technical Overview","year":"2008","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2016.100"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2016.7537156"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"},{"journal-title":"Preventing mix-up attacks with OpenID Connect","year":"2016","author":"curtis","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SysEng.2016.7753150"},{"key":"ref6","article-title":"A lightweight authentication scheme for mobile cloud computing","volume":"14","author":"momeni","year":"2014","journal-title":"International Journal of Computer Science and Business Informatics"},{"key":"ref5","volume":"27","author":"stojmenovic","year":"2003","journal-title":"Handbook of Wireless Network and Mobile Computing"},{"journal-title":"Oasis Security Services (Saml) Tc","year":"2012","author":"klingenstein","key":"ref8"},{"journal-title":"A standards-based mobile application idm architecture","year":"2011","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.85"},{"journal-title":"Authentication and Authorization for Mobile Devices","year":"2012","author":"ranjbar","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2016.22"},{"key":"ref20","first-page":"397","article-title":"On breaking saml: Be whoever you want to be","author":"somorovsky","year":"2012","journal-title":"USENIX Security Symposium"},{"article-title":"On the security of modern single sign-on protocols: Second-order vulnerabilities in openid connect","year":"2015","author":"mladenov","key":"ref22"},{"key":"ref21","article-title":"SAML proposal for securing XML web services. Project paper","author":"naithan","year":"2008","journal-title":"University of St Thomas Saint Paul"},{"journal-title":"Global Information Assurance Certification Paper","year":"2003","key":"ref24"},{"key":"ref23","first-page":"298","article-title":"Security analysis of the saml single sign-on browser\/artifact profile","author":"gro?","year":"2003","journal-title":"Computer Security Applications Conference 2003 Proceedings 19th Annual"},{"journal-title":"Researchers find two flaws in OAuth 2 0","year":"2016","author":"millman","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978385"}],"event":{"name":"2017 24th International Conference on Telecommunications (ICT)","start":{"date-parts":[[2017,5,3]]},"location":"Limassol, Cyprus","end":{"date-parts":[[2017,5,5]]}},"container-title":["2017 24th International Conference on Telecommunications (ICT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7990619\/7998220\/07998280.pdf?arnumber=7998280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T23:51:43Z","timestamp":1503532303000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7998280\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/ict.2017.7998280","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}