{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:02:06Z","timestamp":1730318526594,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,6,15]],"date-time":"2016-06-15T00:00:00Z","timestamp":1465948800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,6,15]]},"DOI":"10.1145\/2935663.2935673","type":"proceedings-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T21:50:36Z","timestamp":1465595436000},"page":"69-75","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Verification of a Multi-Domain Authentication and Authorization Infrastructure Yamata-no-Orochi"],"prefix":"10.1145","author":[{"given":"Kei","family":"Mikami","sequence":"first","affiliation":[{"name":"Faculty of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]},{"given":"Daisuke","family":"Ando","sequence":"additional","affiliation":[{"name":"Graduate School of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]},{"given":"Kunitake","family":"Kaneko","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]},{"given":"Fumio","family":"Teraoka","sequence":"additional","affiliation":[{"name":"Faculty of Science and Technology, Keio University Yokohama, Kanagawa, Japan"}]}],"member":"320","published-online":{"date-parts":[[2016,6,15]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"849","article-title":"Yamata-no-Orochi: an Authentication and Authorization Infrastructure for Internet Services (in Japanese)","volume":"55","author":"Atsuya Y.","year":"2014","unstructured":"Y. Atsuya , K. Kaneko , and F. Teraoka . Yamata-no-Orochi: an Authentication and Authorization Infrastructure for Internet Services (in Japanese) . IPSJ Journal , 55 ( 2 ): 849 -- 864 , February 2014 . Y. Atsuya, K. Kaneko, and F. Teraoka. Yamata-no-Orochi: an Authentication and Authorization Infrastructure for Internet Services (in Japanese). IPSJ Journal, 55(2):849--864, February 2014.","journal-title":"IPSJ Journal"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1145\/2695664.2696047"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_3_1","DOI":"10.1109\/CloudCom.2013.162"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.1109\/35.312841"},{"unstructured":"Shibboleth. https:\/\/shibboleth.net. Shibboleth. https:\/\/shibboleth.net.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1109\/EDOCW.2008.6"},{"unstructured":"Internet2. http:\/\/www.internet2.edu. Internet2. http:\/\/www.internet2.edu.","key":"e_1_3_2_1_7_1"},{"unstructured":"Security Assertion Markup Language (SAML). http:\/\/saml.xml.org. Security Assertion Markup Language (SAML). http:\/\/saml.xml.org.","key":"e_1_3_2_1_8_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/NAS.2007.42"},{"unstructured":"OpenID Connect. http:\/\/openid.net\/connect\/. OpenID Connect. http:\/\/openid.net\/connect\/.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","first-page":"219","volume-title":"Proc. of 16th International Conference on e-Health Networking, Applications and Services 2014","author":"Domenech M. C.","year":"2014","unstructured":"M. C. Domenech , E. Comunello , and M. S. Wangham . Identity management in e-Health: A case study of web of things application using OpenID connect . In Proc. of 16th International Conference on e-Health Networking, Applications and Services 2014 , pages 219 -- 224 , Oct 2014 . M. C. Domenech, E. Comunello, and M. S. Wangham. Identity management in e-Health: A case study of web of things application using OpenID connect. In Proc. of 16th International Conference on e-Health Networking, Applications and Services 2014, pages 219--224, Oct 2014."},{"unstructured":"OpenID Foundation. http:\/\/openid.net\/foundation\/. OpenID Foundation. http:\/\/openid.net\/foundation\/.","key":"e_1_3_2_1_12_1"},{"unstructured":"OASIS eXtensible Access Control Markup Language (XACML). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html. OASIS eXtensible Access Control Markup Language (XACML). http:\/\/docs.oasis-open.org\/xacml\/3.0\/xacml-3.0-core-spec-os-en.html.","key":"e_1_3_2_1_13_1"},{"volume-title":"Diameter Base Protocol","year":"2012","author":"Fajardo V.","unstructured":"V. Fajardo , J. Arkko , J. Loughney , and G. Zorn . Diameter Base Protocol , 2012 . RFC 6733. V. Fajardo, J. Arkko, J. Loughney, and G. Zorn. Diameter Base Protocol, 2012. RFC 6733.","key":"e_1_3_2_1_14_1"},{"volume-title":"Extensible Authentication Protocol (EAP)","year":"2004","author":"Aboba B.","unstructured":"B. Aboba , L. Blunk , J. Vollbrecht , J. Carlson , and H. Levkowetz . Extensible Authentication Protocol (EAP) , 2004 . RFC 3748. B. Aboba, L. Blunk, J. Vollbrecht, J. Carlson, and H. Levkowetz. Extensible Authentication Protocol (EAP), 2004. RFC 3748.","key":"e_1_3_2_1_15_1"},{"issue":"4","key":"e_1_3_2_1_16_1","first-page":"114","article-title":"freeDiameter: An Open Source Framework for an Authentication, Authorization, and Accounting Infrastructure","volume":"28","author":"Decugis S.","year":"2011","unstructured":"S. Decugis and F. Teraoka . freeDiameter: An Open Source Framework for an Authentication, Authorization, and Accounting Infrastructure . Computer Software , 28 ( 4 ): 114 -- 125 , 11 2011 . S. Decugis and F. Teraoka. freeDiameter: An Open Source Framework for an Authentication, Authorization, and Accounting Infrastructure. Computer Software, 28(4):114--125, 11 2011.","journal-title":"Computer Software"},{"volume-title":"E95-D(2):503--513, 3","year":"2012","author":"Ben Ayed S.","unstructured":"S. Ben Ayed and F. Teraoka . A Multi-Domain Access Control Infrastructure Based on Diameter and EAP. IEICE Transactions on Information and Systems , E95-D(2):503--513, 3 2012 . S. Ben Ayed and F. Teraoka. A Multi-Domain Access Control Infrastructure Based on Diameter and EAP. IEICE Transactions on Information and Systems, E95-D(2):503--513, 3 2012.","key":"e_1_3_2_1_17_1"},{"volume-title":"Diameter Extensible Authentication Protocol (EAP) Application","year":"2005","author":"Eronen P.","unstructured":"P. Eronen , T. Hiller , and G. Zorn . Diameter Extensible Authentication Protocol (EAP) Application , 2005 . RFC 4702. P. Eronen, T. Hiller, and G. Zorn. Diameter Extensible Authentication Protocol (EAP) Application, 2005. RFC 4702.","key":"e_1_3_2_1_18_1"},{"unstructured":"XMLSec Library. https:\/\/www.aleksey.com\/xmlsec\/. XMLSec Library. https:\/\/www.aleksey.com\/xmlsec\/.","key":"e_1_3_2_1_19_1"},{"unstructured":"Linux WPA Supplicant. https:\/\/w1.fi\/wpa_supplicant\/. Linux WPA Supplicant. https:\/\/w1.fi\/wpa_supplicant\/.","key":"e_1_3_2_1_20_1"},{"unstructured":"The XML C parser and toolkit of Gnome. http:\/\/www.xmlsoft.org. The XML C parser and toolkit of Gnome. http:\/\/www.xmlsoft.org.","key":"e_1_3_2_1_21_1"}],"event":{"sponsor":["AsiaFI Asia Future Internet"],"acronym":"CFI '16","name":"CFI '16: The 11th International Conference on Future Internet Technologies","location":"Nanjing China"},"container-title":["Proceedings of the 11th International Conference on Future Internet Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2935663.2935673","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,14]],"date-time":"2023-01-14T02:59:23Z","timestamp":1673665163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2935663.2935673"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,15]]},"references-count":21,"alternative-id":["10.1145\/2935663.2935673","10.1145\/2935663"],"URL":"https:\/\/doi.org\/10.1145\/2935663.2935673","relation":{},"subject":[],"published":{"date-parts":[[2016,6,15]]},"assertion":[{"value":"2016-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}