Sciweavers

4 search results - page 1 / 1
» Verified implementations of the information card federated i...
Sort
View
CCS
2008
ACM
15 years 6 days ago
Verified implementations of the information card federated identity-management protocol
We describe reference implementations for selected configurations of the user authentication protocol defined by the Information Card
Karthikeyan Bhargavan, Cédric Fournet, Andr...
99
Voted
IEEEARES
2010
IEEE
15 years 5 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
93
Voted
FC
2000
Springer
83views Cryptology» more  FC 2000»
15 years 1 months ago
Secret Key Authentication with Software-Only Verification
Abstract Two protocols for authentication based on symmetric key cryptography are described, where the verifier can be implemented in software completely, without the need for secu...
Jaap-Henk Hoepman
JSW
2007
124views more  JSW 2007»
14 years 10 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon