Sciweavers

4320 search results - page 22 / 864
» Identity management architecture
Sort
View
DIM
2005
ACM
14 years 11 months ago
DECIDE: a scheme for decentralized identity escrow
Noburou Taniguchi, Koji Chida, Osamu Shionoiri, At...
NORDSEC
2009
Springer
15 years 2 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
COLCOM
2007
IEEE
15 years 4 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CORR
2006
Springer
104views Education» more  CORR 2006»
14 years 9 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
84
Voted
AINA
2006
IEEE
15 years 3 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick