{"id":"https://openalex.org/W1778482256","doi":"https://doi.org/10.3233/jcs-2009-0380","title":"Assurance for federated identity management","display_name":"Assurance for federated identity management","publication_year":2010,"publication_date":"2010-06-01","ids":{"openalex":"https://openalex.org/W1778482256","doi":"https://doi.org/10.3233/jcs-2009-0380","mag":"1778482256"},"language":"en","primary_location":{"id":"doi:10.3233/jcs-2009-0380","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2009-0380","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5103588511","display_name":"Adrian Baldwin","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Adrian Baldwin","raw_affiliation_strings":["HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com","Correspond.#TAB#"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com","institution_ids":[]},{"raw_affiliation_string":"Correspond.#TAB#","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5055694969","display_name":"Marco Casassa Mont","orcid":"https://orcid.org/0009-0004-7611-6947"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Marco Casassa Mont","raw_affiliation_strings":["HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067929028","display_name":"Yolanta Beres","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Yolanta Beres","raw_affiliation_strings":["HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013373237","display_name":"Simon Shiu","orcid":"https://orcid.org/0000-0003-2813-3561"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Simon Shiu","raw_affiliation_strings":["HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com"],"affiliations":[{"raw_affiliation_string":"HP Laboratories, Bristol, UK. E-mails: adrian.baldwin@hp.com, marco.casassa-mont@hp.com, yolanta.beres@hp.com, simon.shiu@hp.com","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5103588511"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":5.5496,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.95738337,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"18","issue":"4","first_page":"541","last_page":"572"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/identity-management","display_name":"Identity management","score":0.6241776347160339},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.5838634371757507},{"id":"https://openalex.org/keywords/standardization","display_name":"Standardization","score":0.5663122534751892},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5616241097450256},{"id":"https://openalex.org/keywords/information-assurance","display_name":"Information assurance","score":0.5420237183570862},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.4952374994754791},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4757665991783142},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4579043388366699},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4558410346508026},{"id":"https://openalex.org/keywords/transparency","display_name":"Transparency (behavior)","score":0.4431791305541992},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.41180577874183655},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.38104748725891113},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.35513603687286377},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2987556457519531}],"concepts":[{"id":"https://openalex.org/C555379026","wikidata":"https://www.wikidata.org/wiki/Q977772","display_name":"Identity management","level":3,"score":0.6241776347160339},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.5838634371757507},{"id":"https://openalex.org/C188087704","wikidata":"https://www.wikidata.org/wiki/Q369577","display_name":"Standardization","level":2,"score":0.5663122534751892},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5616241097450256},{"id":"https://openalex.org/C2780795517","wikidata":"https://www.wikidata.org/wiki/Q6030997","display_name":"Information assurance","level":3,"score":0.5420237183570862},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.4952374994754791},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4757665991783142},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4579043388366699},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4558410346508026},{"id":"https://openalex.org/C2780233690","wikidata":"https://www.wikidata.org/wiki/Q535347","display_name":"Transparency (behavior)","level":2,"score":0.4431791305541992},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.41180577874183655},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.38104748725891113},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.35513603687286377},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2987556457519531},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.3233/jcs-2009-0380","is_oa":false,"landing_page_url":"https://doi.org/10.3233/jcs-2009-0380","pdf_url":null,"source":{"id":"https://openalex.org/S106992369","display_name":"Journal of Computer Security","issn_l":"0926-227X","issn":["0926-227X","1875-8924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Journal of Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.7400000095367432}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":12,"referenced_works":["https://openalex.org/W1484037459","https://openalex.org/W1533455393","https://openalex.org/W1588245570","https://openalex.org/W1642845450","https://openalex.org/W2000866246","https://openalex.org/W2008551576","https://openalex.org/W2056075452","https://openalex.org/W2077251857","https://openalex.org/W2113237548","https://openalex.org/W2126471059","https://openalex.org/W2146308814","https://openalex.org/W2954876078"],"related_works":["https://openalex.org/W2378767206","https://openalex.org/W1540871478","https://openalex.org/W328308450","https://openalex.org/W282641168","https://openalex.org/W2376963063","https://openalex.org/W2066396794","https://openalex.org/W2366734808","https://openalex.org/W4391222116","https://openalex.org/W4390678258","https://openalex.org/W2296702370"],"abstract_inverted_index":{"Federated":[0],"identity":[1,44,86,92,136],"management":[2,45,87],"is":[3,8,21,26,96],"an":[4,76,140],"emerging":[5],"paradigm":[6],"that":[7,20,57,62],"rightly":[9],"getting":[10],"a":[11,145],"lot":[12],"of":[13,38,49,78,106,125,152],"standardization":[14],"and":[15,41,60,88,109,122,138],"research":[16],"attention.":[17],"One":[18],"aspect":[19],"not":[22],"receiving":[23],"enough":[24],"attention":[25],"assurance.":[27],"Given":[28],"the":[29,47,79,126,149],"challenges":[30],"enterprises":[31],"faced":[32],"trying":[33],"to":[34,51,54,85,90,97,103],"demonstrate":[35],"appropriate":[36],"control":[37],"their":[39],"internal":[40],"monol":[42],"ithic":[43],"systems,":[46],"problem":[48],"how":[50,82,116,129,139],"provide":[52,144],"assurance":[53,80,118,127,141,150],"multiple":[55],"stakeholders":[56],"controls,":[58],"operations":[59],"technologies":[61,132],"cut":[63],"across":[64],"organisational":[65],"boundaries,":[66],"are":[67],"appropriately":[68],"mitigating":[69],"risk,":[70],"looks":[71],"daunting.":[72],"The":[73],"paper":[74],"provides":[75],"exposition":[77],"process,":[81],"it":[83],"applies":[84],"particularly":[89],"federated":[91],"management.":[93],"Our":[94],"contribution":[95],"show":[98,115],"technology":[99],"can":[100,120,133,143],"be":[101],"used":[102],"overcome":[104],"many":[105],"trust,":[107],"transparency":[108],"information":[110],"reconciliation":[111],"problems.":[112],"Specifically":[113],"we":[114],"declarative":[117],"models":[119],"orchestrate":[121],"automate":[123],"much":[124],"work,":[128],"certain":[130],"enforcement":[131],"radically":[134],"improve":[135],"assurance,":[137],"framework":[142],"basis":[146],"for":[147],"judging":[148],"value":[151],"security":[153],"technologies.":[154]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
