Sciweavers

308 search results - page 20 / 62
» Identity as a Service - Towards a Service-Oriented Identity ...
Sort
View
ISCC
2008
IEEE
14 years 3 months ago
A sybilproof distributed identity management for P2P networks
Structured P2P networks are vulnerable to the sybil attack. In this attack, a misbehaving person generates a huge number of node identifiers and possibly chooses some of them in ...
François Lesueur, Ludovic Mé, Val&ea...
BDIM
2007
IEEE
171views Business» more  BDIM 2007»
14 years 3 months ago
A Model Driven Framework for IT Transformation
IT organizations are facing significant business and technical challenges today. On the business realm, companies are increasingly outsourcing their IT operations to specialized I...
Santhosh Kumaran, Tian Chao, Kamal Bhattacharya, P...
ESCIENCE
2005
IEEE
14 years 2 months ago
Identity-Based Cryptography for Grid Security
The majority of current security architectures for grid systems use public key infrastructure (PKI) to authenticate identities of grid members and to secure resource allocation to...
Hoon Wei Lim, Kenneth G. Paterson
GI
2008
Springer
13 years 9 months ago
Von der Accountverwaltung zum erweiterten Identity Management
Abstract: Das Identity Management (IDM) an Hochschulen ist in der Praxis angekommen und muss sich in der Realit¨at bew¨ahren. Hierzu z¨ahlt einerseits die Integration von Datenb...
Tarik Gasmi, Gerhard Schneider, Dirk von Suchodole...
NORDSEC
2009
Springer
14 years 1 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...