Sciweavers

270 search results - page 2 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
OZCHI
2006
ACM
14 years 1 months ago
Beyond security: implications for the future of federated digital identity management systems
Federated identity management is often viewed by corporations as a solution to support secure online commerce by synthesising complex and fragmented user information into a single...
Christine Satchell, Graeme G. Shanks, Steve Howard...
ISSA
2008
13 years 9 months ago
A User Centric Model for Online Identity and Access Management
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
Matthew Deas, Stephen Flowerday
ENTCS
2008
130views more  ENTCS 2008»
13 years 7 months ago
The SPARTA Pseudonym and Authorization System
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may...
Giuseppe Bianchi, M. Bonola, Vincenzo Falletta, Fr...
CHI
2010
ACM
14 years 2 months ago
After access: challenges facing mobile-only internet users in the developing world
This study reports results of an ethnographic action research study, exploring mobile-centric internet use. Over the course of 13 weeks, eight women, each a member of a livelihood...
Shikoh Gitau, Gary Marsden, Jonathan Donner
SAINT
2002
IEEE
14 years 12 days ago
Implementation and Evaluation of Authorized Access LAN Sockets Using PPPoE
This paper presents an integrated method to achieve authorized access on LAN sockets in a campus network. The key issues of our method are user authentication and user tracking. W...
Hideo Masuda, Michio Nakanishi, Masahide Nakamura,...