{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T15:13:02Z","timestamp":1730301182903,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/trustcom.2013.89","type":"proceedings-article","created":{"date-parts":[[2013,12,17]],"date-time":"2013-12-17T19:46:29Z","timestamp":1387309589000},"page":"736-745","source":"Crossref","is-referenced-by-count":7,"title":["Portable Personal Identity Provider in Mobile Phones"],"prefix":"10.1109","author":[{"given":"Md. Sadek","family":"Ferdous","sequence":"first","affiliation":[]},{"given":"Ron","family":"Poet","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Liberty ID-FF Architecture Overview","year":"2011","author":"project","key":"19"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37282-7_13"},{"journal-title":"On Identity-Aware Devices Putting Users in Control Across Federated Services","year":"2008","author":"mont","key":"17"},{"journal-title":"Electronic Authentication Guideline INFORMATION SECURITY","year":"2006","key":"36"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1314403.1314412"},{"journal-title":"PHP OpenID Library by JanRain Inc","year":"0","key":"33"},{"journal-title":"Generic Bootstrapping Architecture (GBA) Framework","year":"2006","author":"aboba","key":"15"},{"journal-title":"Jetty WebServer","year":"0","key":"34"},{"year":"2012","key":"16"},{"journal-title":"Openid Provider Authentication Policy Extension 1 0","year":"2008","key":"39"},{"journal-title":"Study on Mobile Identity Management","year":"2005","key":"13"},{"journal-title":"Generic authentication architecture (gaa)","year":"2012","key":"14"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/2046642.2046653"},{"year":"0","key":"11"},{"journal-title":"A Brief Introduction to XACML","year":"2003","key":"38"},{"year":"2012","key":"12"},{"journal-title":"Federated Login for Google Account Users","year":"0","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810375"},{"journal-title":"OpenID Attribute Exchange 1 0 - Final","year":"2007","key":"40"},{"key":"22","first-page":"33","article-title":"User-centric mobile identity management services","author":"maliki","year":"2008","journal-title":"Management"},{"journal-title":"Second Online Security Breach Hits Sony","year":"2011","key":"23"},{"journal-title":"LinkedIn Passwords Leaked by Hackers","year":"2012","key":"24"},{"journal-title":"Hackers Leak 1 Million Apple UDIDs","year":"2012","author":"constantin","key":"25"},{"key":"26","first-page":"99","article-title":"Trust requirements in identity management","volume":"44","author":"j\ufffdsang","year":"2005","journal-title":"Proceedings of the 2005 Australasian Workshop on Grid Computing and E-research"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSim.2012.6266958"},{"year":"0","key":"28"},{"year":"0","key":"29"},{"journal-title":"Openid Authentication 2 0-Final","year":"2007","key":"3"},{"journal-title":"Shibboleth","year":"0","key":"2"},{"journal-title":"Web Services Federation Language (WSFederation)","year":"2009","author":"standard","key":"10"},{"key":"1","first-page":"143","article-title":"Usability and privacy in identity management architectures","author":"j\ufffdsang","year":"2007","journal-title":"Proceedings of the fifth Australasian symposium on ACSW frontiers"},{"year":"0","key":"30"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2012.6317397"},{"key":"6","first-page":"96","article-title":"Federated identity management","author":"chadwick","year":"2009","journal-title":"FOSAD 2008\/2009"},{"year":"0","key":"32"},{"journal-title":"Baseline Capabilities for Enhanced Global Identity Management and Interoperability","year":"2009","key":"5"},{"journal-title":"OpenID4Java Library","year":"0","key":"31"},{"journal-title":"Microsoft Windows Cardspace","year":"0","key":"4"},{"journal-title":"Assertions and Protocols for the Oasis Security Assertion Markup Language (SAML) V2 0","year":"2005","author":"standard","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04766-4_4"}],"event":{"name":"2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","start":{"date-parts":[[2013,7,16]]},"location":"Melbourne, Australia","end":{"date-parts":[[2013,7,18]]}},"container-title":["2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679587\/6680793\/06680909.pdf?arnumber=6680909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:22:23Z","timestamp":1490228543000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6680909\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/trustcom.2013.89","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}