Sciweavers

270 search results - page 5 / 54
» Authorization of User Profile Access in Identity Management
Sort
View
JCM
2006
99views more  JCM 2006»
13 years 7 months ago
VIP (VHE in Mobile IP Networks) Architecture
In this study we propose a new architecture named VIP (VHE in mobile IP networks) which guarantees authorized user access and user mobility management. The main goal is to bring th...
Octavio Ramirez Rojas, Jalel Ben-Othman, Safouane ...
CSCW
2008
ACM
13 years 9 months ago
Family accounts: a new paradigm for user accounts within the home environment
In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at hom...
Serge Egelman, A. J. Bernheim Brush, Kori M. Inkpe...
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 4 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
HICSS
2008
IEEE
148views Biometrics» more  HICSS 2008»
14 years 1 months ago
Consumer-Centric and Privacy-Preserving Identity Management for Distributed E-Health Systems
A new framework of privacy-preserving identity management for distributed e-Health systems is proposed. Utilizing a consumer-centric approach, the healthcare consumer maintains a ...
Richard Au, Peter Croll
WWW
2009
ACM
14 years 8 months ago
All your contacts are belong to us: automated identity theft attacks on social networks
Social networking sites have been increasingly gaining popularity. Well-known sites such as Facebook have been reporting growth rates as high as 3% per week [5]. Many social netwo...
Leyla Bilge, Thorsten Strufe, Davide Balzarotti, E...