{"id":"https://openalex.org/W2294768118","doi":"https://doi.org/10.14279/tuj.eceasst.31.554","title":"Patterns of Federated Identity Management Systems as Architectural Reconfigurations","display_name":"Patterns of Federated Identity Management Systems as Architectural Reconfigurations","publication_year":2024,"publication_date":"2024-03-25","ids":{"openalex":"https://openalex.org/W2294768118","doi":"https://doi.org/10.14279/tuj.eceasst.31.554","mag":"2294768118"},"language":"en","primary_location":{"id":"doi:10.14279/tuj.eceasst.31.554","is_oa":true,"landing_page_url":"https://doi.org/10.14279/tuj.eceasst.31.554","pdf_url":null,"source":{"id":"https://openalex.org/S7407052985","display_name":"Technische Universit\u00e4t Berlin \u2013 Universit\u00e4tsbibliothek","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"type":"article","indexed_in":["datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://doi.org/10.14279/tuj.eceasst.31.554","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037152004","display_name":"Hyder Ali Nizamani","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Nizamani, Hyder","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5056498850","display_name":"Emilio Tuosto","orcid":"https://orcid.org/0000-0002-7032-3281"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Tuosto, Emilio","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037152004"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.00118611,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"31","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9911999702453613,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13999","display_name":"Digital Rights Management and Security","score":0.9896000027656555,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7988113164901733},{"id":"https://openalex.org/keywords/rewriting","display_name":"Rewriting","score":0.7626846432685852},{"id":"https://openalex.org/keywords/architectural-style","display_name":"Architectural style","score":0.7315167784690857},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6465957164764404},{"id":"https://openalex.org/keywords/style","display_name":"Style (visual arts)","score":0.5001742839813232},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.4886517822742462},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4461635947227478},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4404739737510681},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.41722163558006287},{"id":"https://openalex.org/keywords/architectural-pattern","display_name":"Architectural pattern","score":0.4113367199897766},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36145874857902527},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.20545557141304016},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17996686697006226},{"id":"https://openalex.org/keywords/aesthetics","display_name":"Aesthetics","score":0.08109444379806519},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.07361966371536255}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7988113164901733},{"id":"https://openalex.org/C154690210","wikidata":"https://www.wikidata.org/wiki/Q1668499","display_name":"Rewriting","level":2,"score":0.7626846432685852},{"id":"https://openalex.org/C2777364373","wikidata":"https://www.wikidata.org/wiki/Q32880","display_name":"Architectural style","level":3,"score":0.7315167784690857},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6465957164764404},{"id":"https://openalex.org/C2776445246","wikidata":"https://www.wikidata.org/wiki/Q1792644","display_name":"Style (visual arts)","level":2,"score":0.5001742839813232},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.4886517822742462},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4461635947227478},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4404739737510681},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.41722163558006287},{"id":"https://openalex.org/C72280835","wikidata":"https://www.wikidata.org/wiki/Q635346","display_name":"Architectural pattern","level":5,"score":0.4113367199897766},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36145874857902527},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.20545557141304016},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17996686697006226},{"id":"https://openalex.org/C107038049","wikidata":"https://www.wikidata.org/wiki/Q35986","display_name":"Aesthetics","level":1,"score":0.08109444379806519},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.07361966371536255},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C52913732","wikidata":"https://www.wikidata.org/wiki/Q857102","display_name":"Software design","level":4,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.14279/tuj.eceasst.31.554","is_oa":true,"landing_page_url":"https://doi.org/10.14279/tuj.eceasst.31.554","pdf_url":null,"source":{"id":"https://openalex.org/S7407052985","display_name":"Technische Universit\u00e4t Berlin \u2013 Universit\u00e4tsbibliothek","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article-journal"},{"id":"mag:2294768118","is_oa":false,"landing_page_url":"http://journal.ub.tu-berlin.de/eceasst/article/download/554/591","pdf_url":null,"source":{"id":"https://openalex.org/S112260463","display_name":"Electronic Communication of The European Association of Software Science and Technology","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":"Electronic Communication of The European Association of Software Science and Technology","raw_type":null}],"best_oa_location":{"id":"doi:10.14279/tuj.eceasst.31.554","is_oa":true,"landing_page_url":"https://doi.org/10.14279/tuj.eceasst.31.554","pdf_url":null,"source":{"id":"https://openalex.org/S7407052985","display_name":"Technische Universit\u00e4t Berlin \u2013 Universit\u00e4tsbibliothek","issn_l":null,"issn":[],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article-journal"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W1532740091","https://openalex.org/W2344257933","https://openalex.org/W2183415127","https://openalex.org/W2915009771","https://openalex.org/W2162923122","https://openalex.org/W2185424674","https://openalex.org/W177854965","https://openalex.org/W2171430770","https://openalex.org/W2775952819","https://openalex.org/W2289241787","https://openalex.org/W1980174522","https://openalex.org/W2399501035","https://openalex.org/W2505568333","https://openalex.org/W2944198321","https://openalex.org/W2118926712","https://openalex.org/W391140592","https://openalex.org/W2483306774","https://openalex.org/W2015877948","https://openalex.org/W2056360742","https://openalex.org/W2106579228"],"abstract_inverted_index":{"This":[0,62],"paper":[1,63],"proposes":[2,64],"a":[3,65],"formal":[4,66],"model":[5,67,101],"of":[6,14,36,40,53,91,96,110],"Federated":[7],"Identity":[8],"Management":[9],"systems":[10],"(FIMs)":[11],"in":[12,94,108],"terms":[13,95,109],"architectural":[15,75,80,111],"design":[16,112],"rewriting.":[17],"FIMs":[18,41,69],"allow":[19],"cross-domain":[20],"user":[21],"authentication":[22],"to":[23,48,70,84],"enable":[24],"access":[25],"control":[26],"across":[27],"the":[28,31,49,54,92,97],"organisations":[29],"under":[30],"concept":[32],"known":[33],"as":[34,43,74],"Circle":[35],"Trust":[37],"(CoT).":[38],"Patterns":[39],"emerged":[42],"recurring":[44],"CoT":[45,93],"scenarios":[46],"due":[47],"fact":[50],"that":[51],"each":[52],"pattern":[55],"has":[56],"different":[57],"security":[58],"and":[59],"trust":[60],"requirements.":[61],"for":[68],"characterise":[71],"their":[72],"patterns":[73],"styles.":[76],"More":[77],"precisely,":[78],"an":[79],"style":[81],"is":[82,102],"given":[83],"precisely":[85],"pinpoint":[86],"all":[87],"possible":[88],"legal":[89],"configurations":[90],"patterns.":[98],"The":[99],"proposed":[100],"specified":[103],"through":[104],"style-consistent":[105],"(graphical)":[106],"designs":[107],"rewriting":[113],"(ADR).":[114]},"counts_by_year":[],"updated_date":"2025-11-06T06:51:31.235846","created_date":"2025-10-10T00:00:00"}
