Sciweavers

1663 search results - page 30 / 333
» Privacy and Identity Management
Sort
View
106
Voted
ACISP
2006
Springer
15 years 5 months ago
Efficient Identity-Based Signatures Secure in the Standard Model
The only known construction of identity-based signatures that can be proven secure in the standard model is based on the approach of attaching certificates to non-identity-based si...
Kenneth G. Paterson, Jacob C. N. Schuldt
GLOBECOM
2008
IEEE
15 years 8 months ago
Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...
Niklas Neumann, Xiaoming Fu
SECURWARE
2007
IEEE
15 years 8 months ago
Distributed Identity Management Model for Digital Ecosystems
— Digital Ecosystems is the new paradigm for dynamic IT business integration. A Digital Ecosystem consists of institutions that compete, collaborate, and form stable or unstable ...
Hristo Koshutanski, Mihaela Ion, Luigi Telesca
EKAW
2010
Springer
15 years 13 days ago
Practical Considerations on Identity for Instance Management in Ontological Investigation
For knowledge representation based on ontology and its use, it is desirable to understand phenomena in the target world as precisely and deeply as possible. The ontology should ref...
Kouji Kozaki, Satoshi Endo, Riichiro Mizoguchi
OZCHI
2006
ACM
15 years 7 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...