Sciweavers

464 search results - page 25 / 93
» Identity Management
Sort
View
AGILEDC
2007
IEEE
14 years 2 months ago
Implementing Scrum in a Distributed Software Development Organization
This paper describes the start of the implementation of Scrum within BMC Software (Identity Management business unit). It describes the project, the project structure and the firs...
Hubert Smits, Guy Pshigoda
DIM
2008
ACM
13 years 9 months ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
CORR
2008
Springer
104views Education» more  CORR 2008»
13 years 7 months ago
Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architec...
Mikaël Ates, Christophe Gravier, Jér&e...
APCCAS
2006
IEEE
249views Hardware» more  APCCAS 2006»
14 years 1 months ago
Uncertainty Management for Estimation in Dynamical Systems
— A novel black-box model for time series of prices analysis is proposed. It is constructed using the technique of “shaping filter”. The model identification is then propos...
H. Baili
IH
1998
Springer
13 years 12 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes