Abstract— In highly open systems like the Internet, attributebased access control (ABAC) has proven its appropriateness. This is reflected in the utilization of ABAC in authenti...
Torsten Priebe, Wolfgang Dobmeier, Christian Schl&...
The Semantic Web's success will depend on the implementation and use of Web Service becoming preeminent in Ecommerce, which will likely be agent-based in the future. On the S...
A simple theoretical framework is developed to evaluate the security and usability of eavesdroppingresistant authentication schemes. Such schemes strive to allow users to authenti...
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In t...
Mohammad Mesbah Uddin, Salahuddin Muhammad Salim Z...
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...