— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....
For each industry, there exist many taxonomies that are intended for various applications. There are also multiple sources of regulations from different government agencies. Indus...