{"id":"https://openalex.org/W2096733704","doi":"https://doi.org/10.1109/mic.2003.1250582","title":"Analysis of liberty single-sign-on with enabled clients","display_name":"Analysis of liberty single-sign-on with enabled clients","publication_year":2003,"publication_date":"2003-11-01","ids":{"openalex":"https://openalex.org/W2096733704","doi":"https://doi.org/10.1109/mic.2003.1250582","mag":"2096733704"},"language":"en","primary_location":{"id":"doi:10.1109/mic.2003.1250582","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mic.2003.1250582","pdf_url":null,"source":{"id":"https://openalex.org/S205899252","display_name":"IEEE Internet Computing","issn_l":"1089-7801","issn":["1089-7801","1941-0131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069656048","display_name":"B. Pfitzmann","orcid":"https://orcid.org/0009-0003-9460-6467"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":true,"raw_author_name":"B. Pfitzmann","raw_affiliation_strings":["IBM Zurich Research Laboratory, Switzerland","IBM Zurich Research Labs, R\u00fcschlikon, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Zurich Research Laboratory, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"IBM Zurich Research Labs, R\u00fcschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078166208","display_name":"Michael Waidner","orcid":"https://orcid.org/0000-0001-7919-9961"},"institutions":[{"id":"https://openalex.org/I4210126328","display_name":"IBM Research - Zurich","ror":"https://ror.org/02js37d36","country_code":"CH","type":"facility","lineage":["https://openalex.org/I1341412227","https://openalex.org/I4210114115","https://openalex.org/I4210126328"]}],"countries":["CH"],"is_corresponding":false,"raw_author_name":"M. Waidner","raw_affiliation_strings":["IBM Zurich Research Laboratory, Switzerland","IBM Zurich Research Labs, R\u00fcschlikon, Switzerland"],"affiliations":[{"raw_affiliation_string":"IBM Zurich Research Laboratory, Switzerland","institution_ids":["https://openalex.org/I4210126328"]},{"raw_affiliation_string":"IBM Zurich Research Labs, R\u00fcschlikon, Switzerland","institution_ids":["https://openalex.org/I4210126328"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069656048"],"corresponding_institution_ids":["https://openalex.org/I4210126328"],"apc_list":null,"apc_paid":null,"fwci":4.4856,"has_fulltext":false,"cited_by_count":70,"citation_normalized_percentile":{"value":0.9513218,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"7","issue":"6","first_page":"38","last_page":"44"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11504","display_name":"Advanced Authentication Protocols Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7789196968078613},{"id":"https://openalex.org/keywords/single-sign-on","display_name":"Single sign-on","score":0.7495447397232056},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6483017206192017},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.644931435585022},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.5677089095115662},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5176194906234741},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5143207311630249},{"id":"https://openalex.org/keywords/xml","display_name":"XML","score":0.5075608491897583},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.5004949569702148},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4146488308906555},{"id":"https://openalex.org/keywords/web-application-security","display_name":"Web application security","score":0.41258862614631653},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.39520758390426636},{"id":"https://openalex.org/keywords/web-development","display_name":"Web development","score":0.2847440242767334},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.27360475063323975}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7789196968078613},{"id":"https://openalex.org/C2776362682","wikidata":"https://www.wikidata.org/wiki/Q568494","display_name":"Single sign-on","level":3,"score":0.7495447397232056},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6483017206192017},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.644931435585022},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.5677089095115662},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5176194906234741},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5143207311630249},{"id":"https://openalex.org/C8797682","wikidata":"https://www.wikidata.org/wiki/Q2115","display_name":"XML","level":2,"score":0.5075608491897583},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.5004949569702148},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4146488308906555},{"id":"https://openalex.org/C59241245","wikidata":"https://www.wikidata.org/wiki/Q4781497","display_name":"Web application security","level":4,"score":0.41258862614631653},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.39520758390426636},{"id":"https://openalex.org/C79373723","wikidata":"https://www.wikidata.org/wiki/Q386275","display_name":"Web development","level":3,"score":0.2847440242767334},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.27360475063323975},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/mic.2003.1250582","is_oa":false,"landing_page_url":"https://doi.org/10.1109/mic.2003.1250582","pdf_url":null,"source":{"id":"https://openalex.org/S205899252","display_name":"IEEE Internet Computing","issn_l":"1089-7801","issn":["1089-7801","1941-0131"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Partnerships for the goals","score":0.5,"id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":10,"referenced_works":["https://openalex.org/W1505561515","https://openalex.org/W1580416641","https://openalex.org/W1660562555","https://openalex.org/W2097913369","https://openalex.org/W2098284912","https://openalex.org/W2113040431","https://openalex.org/W2118783124","https://openalex.org/W2156877380","https://openalex.org/W2725758462","https://openalex.org/W6630292809"],"related_works":["https://openalex.org/W2493320815","https://openalex.org/W2368596295","https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2656445685","https://openalex.org/W2115218409","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W2728487846","https://openalex.org/W4386427074"],"abstract_inverted_index":{"Web":[0,119],"single-sign-on":[1,46],"protocols-such":[2],"as":[3,83],"Microsoft":[4],"passport,":[5],"Oasis's":[6],"security":[7,20,113],"assertion":[8],"markup":[9],"language":[10],"(SAML),":[11],"and":[12,57,72,92,118],"the":[13,40,63,89,110],"Internet2":[14],"project":[15],"Shibboleth,":[16],"aim":[17],"to":[18,27,54],"solve":[19],"problems":[21],"by":[22,61],"letting":[23],"individuals":[24],"log":[25],"in":[26,39],"many":[28],"Internet":[29],"services":[30],"while":[31],"authenticating":[32],"only":[33],"once,":[34],"or":[35],"at":[36],"least":[37],"always":[38],"same":[41],"way.":[42],"Enterprises":[43],"hope":[44],"that":[45],"protocols":[47,114],"will":[48],"significantly":[49],"decrease":[50],"customer-care":[51],"costs":[52],"due":[53],"forgotten":[55],"passwords":[56],"increase":[58],"e-commerce":[59],"transactions":[60],"enhancing":[62],"user":[64],"experience.":[65],"Commercial":[66],"interest":[67],"centers":[68],"on":[69,73,88,116],"distributed":[70],"enterprises":[71,77],"small":[74],"federations":[75],"of":[76,112],"with":[78],"existing":[79],"business":[80],"relationships,":[81],"such":[82],"supply":[84],"chains.":[85],"We":[86,107],"concentrate":[87],"liberty-enabled":[90],"client":[91,103],"proxy":[93],"(LECP)":[94],"profile.":[95],"The":[96],"LECP":[97],"protocol":[98],"assumes":[99],"a":[100],"special":[101],"protocol-aware":[102],"(the":[104],"enabled":[105],"client).":[106],"also":[108],"consider":[109],"design":[111],"based":[115],"XML":[117],"services.":[120]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":7},{"year":2013,"cited_by_count":3},{"year":2012,"cited_by_count":6}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
