Sciweavers

4320 search results - page 4 / 864
» Identity management architecture
Sort
View
CASSIS
2005
Springer
13 years 11 months ago
The Architecture of a Privacy-Aware Access Control Decision Component
Today many interactions are carried out online through Web sites and e-services and often private and/or sensitive information is required by service providers. A growing concern r...
Claudio Agostino Ardagna, Marco Cremonini, Ernesto...
IJAHUC
2010
111views more  IJAHUC 2010»
13 years 3 months ago
A network-based global mobility management architecture
: This paper specifies a network-based global mobility management architecture, named NetGMM. NetGMM supports network-based mobility management and non-Mobile IP mobile environment...
Huachun Zhou, Hongbin Luo, Hongke Zhang, Chi-Hsian...
HCI
2007
13 years 7 months ago
Architectural Backpropagation Support for Managing Ambiguous Context in Smart Environments
Abstract. The evolution to ubiquitous information and communication networks is evident. Technology is emerging that connects everyday objects and embeds intelligence in our enviro...
Davy Preuveneers, Yolande Berbers
CORR
2011
Springer
158views Education» more  CORR 2011»
13 years 1 months ago
The Identity Crisis. Security, Privacy and Usability Issues in Identity Management
Abstract This paper studies the current ‘identity crisis’ caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity ma...
Gergely Alpár, Jaap-Henk Hoepman, Johanneke...
COMPSAC
2008
IEEE
14 years 22 days ago
Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
—Internet users interact with multiple Web Service Providers (WSP), and therefore, must remember and manage multiple passwords. Users try to overcome the burden of password manag...
Golnaz Elahi, Zeev Lieber, Eric S. K. Yu