{"id":"https://openalex.org/W2078953990","doi":"https://doi.org/10.1109/cloud.2014.91","title":"User-Controlled Identity Provisioning for Secure Account Sharing","display_name":"User-Controlled Identity Provisioning for Secure Account Sharing","publication_year":2014,"publication_date":"2014-06-01","ids":{"openalex":"https://openalex.org/W2078953990","doi":"https://doi.org/10.1109/cloud.2014.91","mag":"2078953990"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloud.2014.91","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5004490190","display_name":"Dongxi Liu","orcid":"https://orcid.org/0000-0002-0221-2571"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Dongxi Liu","raw_affiliation_strings":["Comput. Inf., CSIRO, Marsfield, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Comput. Inf., CSIRO, Marsfield, NSW, Australia","institution_ids":["https://openalex.org/I1292875679"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5050018738","display_name":"John \u017dic","orcid":"https://orcid.org/0000-0002-6974-8485"},"institutions":[{"id":"https://openalex.org/I1292875679","display_name":"Commonwealth Scientific and Industrial Research Organisation","ror":"https://ror.org/03qn8fb07","country_code":"AU","type":"government","lineage":["https://openalex.org/I1292875679","https://openalex.org/I2801453606","https://openalex.org/I4387156119"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"John Zic","raw_affiliation_strings":["Comput. Inf., CSIRO, Marsfield, NSW, Australia"],"affiliations":[{"raw_affiliation_string":"Comput. Inf., CSIRO, Marsfield, NSW, Australia","institution_ids":["https://openalex.org/I1292875679"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.413,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.349023,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"644","last_page":"651"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9996,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9799,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/provisioning","display_name":"Provisioning","score":0.8750154},{"id":"https://openalex.org/keywords/shared-resource","display_name":"Shared resource","score":0.6302292},{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.4753601}],"concepts":[{"id":"https://openalex.org/C172191483","wikidata":"https://www.wikidata.org/wiki/Q1071806","display_name":"Provisioning","level":2,"score":0.8750154},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7222076},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.71154225},{"id":"https://openalex.org/C51332947","wikidata":"https://www.wikidata.org/wiki/Q1172305","display_name":"Shared resource","level":2,"score":0.6302292},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.6078687},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5422855},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.4910512},{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.4753601},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.46696857},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4514739},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.39649597},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.38897836},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3691252},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.22024792},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.16023895},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0729419},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/cloud.2014.91","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":9,"referenced_works":["https://openalex.org/W1547131737","https://openalex.org/W1989085188","https://openalex.org/W2030112111","https://openalex.org/W2040295146","https://openalex.org/W2054702684","https://openalex.org/W2098182896","https://openalex.org/W2112995928","https://openalex.org/W2123479684","https://openalex.org/W2146973388"],"related_works":["https://openalex.org/W572531444","https://openalex.org/W4391222116","https://openalex.org/W4390678258","https://openalex.org/W4302444936","https://openalex.org/W2945962340","https://openalex.org/W2893779165","https://openalex.org/W2785227142","https://openalex.org/W2606320129","https://openalex.org/W2296702370","https://openalex.org/W2017432143"],"abstract_inverted_index":{"Clouds":[0],"have":[1],"the":[2,21,43,60,92,99,105],"potentials":[3],"to":[4,34,45,50,66,90,112,130],"facilitate":[5],"resource":[6],"sharing":[7,133],"for":[8,32,88],"collaborations":[9],"among":[10],"different":[11],"organizations":[12],"or":[13],"individuals.":[14],"In":[15],"this":[16,70],"paper,":[17],"we":[18,72],"realise":[19],"that":[20],"identity":[22,76],"management":[23],"scheme":[24],"in":[25,48,55,94],"current":[26,128],"clouds":[27,56,129],"is":[28,40],"not":[29],"very":[30],"convenient":[31],"users":[33,46],"collaborate":[35],"over":[36],"clouds.":[37],"This":[38],"inconvenience":[39],"caused":[41],"by":[42,79,118],"requirement":[44],"who":[47],"order":[49],"access":[51,104],"privately":[52,106],"shared":[53,107],"resources":[54,93,108],"must":[57],"register":[58],"into":[59],"clouds,":[61],"but":[62],"might":[63],"be":[64],"reluctant":[65],"register.":[67,113],"To":[68],"address":[69],"inconvenience,":[71],"propose":[73],"a":[74,81,120],"user-controlled":[75],"provisioning":[77],"mechanism,":[78],"which":[80],"registered":[82],"user":[83],"can":[84,103,126],"create":[85],"local":[86,100],"identities":[87],"collaborators":[89,102],"share":[91],"his":[95],"account,":[96],"and":[97],"using":[98],"identities,":[101],"without":[109],"being":[110],"required":[111],"We":[114,122],"demonstrate":[115],"our":[116,124],"mechanism":[117,125],"implementing":[119],"prototype.":[121],"believe":[123],"benefit":[127],"improve":[131],"their":[132],"services.":[134]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2078953990","counts_by_year":[{"year":2016,"cited_by_count":1},{"year":2015,"cited_by_count":1}],"updated_date":"2025-02-16T17:22:56.313933","created_date":"2016-06-24"}