{"id":"https://openalex.org/W1675329038","doi":"https://doi.org/10.3233/jcs-2008-0324","title":"Notarized federated ID management and authentication*","display_name":"Notarized federated ID management and authentication*","publication_year":2008,"publication_date":"2008-07-16","ids":{"openalex":"https://openalex.org/W1675329038","doi":"https://doi.org/10.3233/jcs-2008-0324","mag":"1675329038"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2008-0324","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2008-0324","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5034971300","display_name":"Michael T. Goodrich","orcid":"https://orcid.org/0000-0002-8943-191X"},"institutions":[{"id":"https://openalex.org/I204250578","display_name":"University of California, Irvine","ror":"https://ror.org/04gyf1771","country_code":"US","type":"education","lineage":["https://openalex.org/I204250578"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Michael T. Goodrich","raw_affiliation_strings":["Department of Computer Science, University of California, Irvine, CA 92697, USA. E-mail: goodrich@acm.org"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of California, Irvine, CA 92697, USA. E-mail: goodrich@acm.org","institution_ids":["https://openalex.org/I204250578"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5079716343","display_name":"Roberto Tamassia","orcid":"https://orcid.org/0000-0003-2445-6064"},"institutions":[{"id":"https://openalex.org/I196272386","display_name":"Providence College","ror":"https://ror.org/00rxpqe74","country_code":"US","type":"education","lineage":["https://openalex.org/I196272386"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Roberto Tamassia","raw_affiliation_strings":["Department of Computer Science, Providence, RI 02912, USA. E-mail: rt@cs.brown.edu"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Providence, RI 02912, USA. E-mail: rt@cs.brown.edu","institution_ids":["https://openalex.org/I196272386"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5034366344","display_name":"Danfeng Yao","orcid":"https://orcid.org/0000-0001-8969-2792"},"institutions":[{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Danfeng (Daphne) Yao","raw_affiliation_strings":["Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA. E-mail: danfeng@cs.rutgers.edu"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA. E-mail: danfeng@cs.rutgers.edu","institution_ids":["https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5034971300"],"corresponding_institution_ids":["https://openalex.org/I204250578"],"apc_list":null,"apc_paid":null,"fwci":1.724,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.86661029,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"16","issue":"4","first_page":"399","last_page":"418"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.8105726838111877},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7197290658950806},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6722474098205566},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.6666468381881714},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6631895899772644},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6278467178344727},{"id":"https://openalex.org/keywords/trusted-third-party","display_name":"Trusted third party","score":0.4852592647075653},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.470289945602417},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4450058937072754},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.3771657943725586},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.17924952507019043},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.09295341372489929}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.8105726838111877},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7197290658950806},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6722474098205566},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.6666468381881714},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6631895899772644},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6278467178344727},{"id":"https://openalex.org/C139089976","wikidata":"https://www.wikidata.org/wiki/Q2142273","display_name":"Trusted third party","level":2,"score":0.4852592647075653},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.470289945602417},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4450058937072754},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.3771657943725586},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.17924952507019043},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.09295341372489929},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-2008-0324","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2008-0324","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.8100000023841858,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":23,"referenced_works":["https://openalex.org/W116946397","https://openalex.org/W1490341282","https://openalex.org/W1549094757","https://openalex.org/W1551041907","https://openalex.org/W1555017476","https://openalex.org/W1569083856","https://openalex.org/W1968554315","https://openalex.org/W2005725110","https://openalex.org/W2031618446","https://openalex.org/W2033820870","https://openalex.org/W2049248053","https://openalex.org/W2059768261","https://openalex.org/W2085733527","https://openalex.org/W2096452207","https://openalex.org/W2098384969","https://openalex.org/W2098662896","https://openalex.org/W2111712517","https://openalex.org/W2125040475","https://openalex.org/W2125591151","https://openalex.org/W2139660932","https://openalex.org/W2152924492","https://openalex.org/W2165210192","https://openalex.org/W2169731081"],"related_works":["https://openalex.org/W2005308538","https://openalex.org/W2370296220","https://openalex.org/W3156653025","https://openalex.org/W1683878900","https://openalex.org/W2213995339","https://openalex.org/W2141072686","https://openalex.org/W2625931504","https://openalex.org/W4211024096","https://openalex.org/W2994906475","https://openalex.org/W2345516443"],"abstract_inverted_index":{"We":[0,65,85],"propose":[1],"a":[2,23,28,88],"notarized":[3,72,105],"federated":[4,73,106],"identity":[5,37,53,74,96,107,129],"management":[6,75,108],"model":[7,21,45,76],"that":[8,118],"supports":[9],"efficient":[10,68],"user":[11],"authentication":[12],"when":[13],"providers":[14,54],"are":[15],"unknown":[16],"to":[17,31,122],"each":[18],"other.":[19],"Our":[20],"introduces":[22],"notary":[24],"service,":[25],"owned":[26],"by":[27,36],"trusted":[29],"third-party,":[30],"dynamically":[32],"notarize":[33],"assertions":[34],"generated":[35],"providers.":[38],"An":[39],"additional":[40],"f":[41],"eature":[42],"of":[43,49,70,94,113,127],"our":[44,71,104,114],"is":[46,117],"the":[47,79,95,125],"avoidance":[48],"direct":[50],"communications":[51],"between":[52],"and":[55,99],"service":[56],"providers,":[57],"which":[58],"provides":[59],"improved":[60],"privacy":[61],"protection":[62],"for":[63,91],"users.":[64],"present":[66],"an":[67],"implementation":[69],"based":[77],"on":[78],"Secure":[80],"Transaction":[81],"Management":[82],"System":[83],"(STMS).":[84],"also":[86],"give":[87],"practical":[89],"solution":[90,116],"mitigating":[92],"aspects":[93],"theft":[97],"problem":[98],"discuss":[100],"its":[101],"use":[102],"in":[103],"model.":[109],"The":[110],"unique":[111],"feature":[112],"cryptographic":[115],"it":[119],"enables":[120],"one":[121],"proactively":[123],"prevent":[124],"leaking":[126],"secret":[128],"information.":[130]},"counts_by_year":[{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
