Sciweavers

1663 search results - page 2 / 333
» Privacy and Identity Management
Sort
View
100
Voted
SOUPS
2009
ACM
15 years 11 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
FC
2009
Springer
121views Cryptology» more  FC 2009»
15 years 11 months ago
Achieving Privacy in a Federated Identity Management System
Federated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domai...
Susan Landau, Hubert Lê Van Gông, Robi...
HCI
2007
15 years 6 months ago
Privacy Requirements in Identity Management Solutions
In this paper we highlight the need for privacy of user data used in digital identity management systems. We investigate the issues from the individual, business, and government pe...
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
126
Voted
IDTRUST
2010
ACM
15 years 12 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...