Sciweavers

1663 search results - page 33 / 333
» Privacy and Identity Management
Sort
View
DIM
2006
ACM
15 years 7 months ago
OpenID 2.0: a platform for user-centric identity management
With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all proble...
David Recordon, Drummond Reed
IDTRUST
2010
ACM
15 years 6 months ago
Federated login to TeraGrid
We present a new federated login capability for the TeraGrid, currently the world’s largest and most comprehensive distributed cyberinfrastructure for open scientific research....
Jim Basney, Terry Fleury, Von Welch
106
Voted
ISSA
2008
15 years 3 months ago
A User Centric Model for Online Identity and Access Management
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
Matthew Deas, Stephen Flowerday
163
Voted
CHIMIT
2009
ACM
15 years 8 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
258
Voted
SACMAT
2011
ACM
14 years 4 months ago
An integrated approach for identity and access management in a SOA context
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we de...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...