Sciweavers

490 search results - page 3 / 98
» Enabling User Control with Personal Identity Management
Sort
View
90
Voted
ACSAC
2000
IEEE
15 years 2 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
74
Voted
ETRICS
2006
15 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
77
Voted
ICSOC
2009
Springer
14 years 8 months ago
Using Personal Information Management Infrastructures to Facilitate User-Generated Services for Personal Use
Ad-hoc and situational applications for personal use will gain more and more traction in the work support for knowledge workers (KWers). Personal information is a key element in th...
Olaf Grebner
77
Voted
ISSA
2008
14 years 11 months ago
A User Centric Model for Online Identity and Access Management
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
Matthew Deas, Stephen Flowerday
94
Voted
EUROSEC
2010
ACM
15 years 3 months ago
Practical protection for personal storage in the cloud
We present a storage management framework for Web 2.0 services that places users back in control of their data. Current Web services complicate data management due to data lock-in...
Neal H. Walfield, Paul T. Stanton, John Linwood Gr...