Sciweavers

8 search results - page 1 / 2
» idtrust 2009
Sort
View
81
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Identity, credential, and access management at NASA, from Zachman to attributes
Corinne S. Irwin, Dennis C. Taylor
72
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Privacy-preserving management of transactions' receipts for mobile environments
Federica Paci, Ning Shang, Sam Kerr, Kevin Steuer ...
IDTRUST
2009
ACM
15 years 7 months ago
Quantum resistant public key cryptography: a survey
Public key cryptography is widely used to secure transactions over the Internet. However, advances in quantum computers threaten to undermine the security assumptions upon which c...
Ray A. Perlner, David A. Cooper
107
Voted
IDTRUST
2009
ACM
15 years 7 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
124
Voted
IDTRUST
2009
ACM
15 years 7 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol