Building on the popularity of online social networks (OSNs) such as Facebook, social content-sharing applications allow users to form communities around shared interests. Millions...
Krishna P. N. Puttaswamy, Alessandra Sala, Ben Y. ...
In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) serviceoriented architectures (SOA). In particular, we deļ¬...
Waldemar Hummer, Patrick Gaubatz, Mark Strembeck, ...
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administratorās time and energy to manually ļ¬lter or remo...
Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized access to usersā ļ¬nancial accounts. Most existing or proposed solut...
ā User authentication is still heavily reliant on the use of passwords, and the security problems associated with passwords are becoming more and more serious. The main causes of...
Beomsoo Park, Sungjin Hong, Jaewook Oh, Heejo Lee,...