Sciweavers

744 search results - page 9 / 149
» The Traust Authorization Service
Sort
View
HICSS
2008
IEEE
147views Biometrics» more  HICSS 2008»
15 years 4 months ago
Conceiving Interoperability between Public Authorities - A Methodical Framework
An increasing level of cooperation between public administrations nowadays on national, regional and local level requires methods to develop interoperable EGovernment systems and ...
Jörg Ziemann, Thomas Matheis, Dirk Werth
IADIS
2004
14 years 11 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
WIS
2004
14 years 11 months ago
Inter-domain Authentication and Authorization Mechanisms for Roaming SIP Users
: To enable users to utilize the services of various providers of multimedia services based on the session initiation protocol (SIP), some kind of interaction is required between t...
Dorgham Sisalem, Jiri Kuthan
75
Voted
ENTCS
2008
130views more  ENTCS 2008»
14 years 9 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
84
Voted
PERCOM
2004
ACM
15 years 9 months ago
Pervasive Authentication Domains for Automatic Pervasive Device Authorization
In a pervasive computing environment, users have many devices that are used to initiate or answer remote service requests, such as obtaining real-time stock quotes, handling corpo...
Reiner Sailer, James Giles