Sciweavers

4320 search results - page 14 / 864
» Identity management architecture
Sort
View
ACSAC
2000
IEEE
14 years 2 months ago
Usability Meets Security -The Identity-Manager as Your Personal Security Assistant for the Internet
In today’s applications, most users disregard the security functionality. They do not have the knowledge and/or the motivation to configure or to use the existing security func...
Uwe Jendricke, Daniela Gerd tom Markotten
HPCNCS
2007
13 years 11 months ago
A Formal Approach for Identity Management in Federated Web Services
The objective of the proposed work is to formally specify and implement a federated web service model in which the identity management problem and security features are analyzed. ...
S. Chandrasekaran, C. Dinesh, Kartic Ramesh, Al. M...
DIM
2006
ACM
14 years 3 months ago
OpenID 2.0: a platform for user-centric identity management
With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all proble...
David Recordon, Drummond Reed
IEEEARES
2010
IEEE
14 years 4 months ago
FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management
—Collaborations by the use of inter-organizational business processes can help companies to achieve a competitive edge over competing businesses. Typically, these collaborations ...
Thorsten Höllrigl, Jochen Dinger, Hannes Hart...
IDTRUST
2009
ACM
14 years 4 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol