Sciweavers

16 search results - page 2 / 4
» Identity federation and privacy: one step beyond
Sort
View
DIM
2006
ACM
13 years 11 months ago
User centricity: a taxonomy and open issues
User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity...
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas ...
SEMWEB
2007
Springer
13 years 11 months ago
Privacy and Capability Management for the European eIDM Framework
The natural evolution of eGovernment is to go beyond the management of identities and therefore it is necessary to manage people, companies or organizations, and their capabilities...
Mario Reyes-Ayala, Ignacio Alamillo, Daniel Chavar...
CTRSA
2008
Springer
137views Cryptology» more  CTRSA 2008»
13 years 7 months ago
Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange
Public key based authentication and key exchange protocols are not usually designed with privacy in mind and thus involve cleartext exchanges of identities and certificates before ...
Stanislaw Jarecki, Jihye Kim, Gene Tsudik
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 5 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
BIOSIG
2010
152views Biometrics» more  BIOSIG 2010»
13 years 3 months ago
Biometric Systems in Future Preventive Scenarios - Legal Issues and Challenges
: The privacy and data protection challenges posed by biometric systems have been discussed in detail in the last years. Both security opportunities and privacy risks however may d...
Gerrit Hornung, Monika Desoi, Matthias Pocs