Sciweavers

1663 search results - page 23 / 333
» Privacy and Identity Management
Sort
View
SPW
2004
Springer
15 years 7 months ago
BLIND: A Complete Identity Protection Framework for End-Points
In this paper, we present a security framework that provides identity protection against active and passive attacks for end-points. The framework is based on a two-round-trip authe...
Jukka Ylitalo, Pekka Nikander
JSW
2007
124views more  JSW 2007»
15 years 1 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
SOUPS
2005
ACM
15 years 7 months ago
Usable security and privacy: a case study of developing privacy management tools
Privacy is a concept which received relatively little attention during the rapid growth and spread of information technology through the 1980’s and 1990’s. Design to make info...
Carolyn Brodie, Clare-Marie Karat, John Karat, Jin...
UIST
1998
ACM
15 years 6 months ago
Of Vampire Mirrors and Privacy Lamps: Privacy Management in Multi-User Augmented Environments
We consider the problem of privacy in a 3D multi-user collaborative environment. We assume that information objects are represented by visual icons, and can either be public or pr...
Andreas Butz, Clifford Beshers, Steven Feiner
INFORMATICALT
2010
126views more  INFORMATICALT 2010»
15 years 9 days ago
Identity-Based Threshold Proxy Signature from Bilinear Pairings
Abstract. Delegation of rights is a common practice in the real world. We present two identitybased threshold proxy signature schemes, which allow an original signer to delegate he...
Jenshiuh Liu, Shaonung Huang