In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deď¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
Understanding the dynamics of technology evolution—whether for the purposes of forecasting new product or technology infrastructure developments, or identifying the basis for fu...
Gediminas Adomavicius, Jesse Bockstedt, Alok Gupta...
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accele...
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Abstract. Digital Rights Management frameworks (DRM) aim at protecting and controlling information contents widely distributed on client devices. Using a license, the content provi...