Sciweavers

4320 search results - page 15 / 864
» Identity management architecture
Sort
View
ETRICS
2006
14 years 1 months ago
Policy-Based Integration of User and Provider-Sided Identity Management
Abstract. Depending on whether the users or the providers are performing it, Identity Management (IM) traditionally has different meanings. For users, IM means to choose between on...
Wolfgang Hommel
ISSA
2008
13 years 11 months ago
A User Centric Model for Online Identity and Access Management
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to...
Matthew Deas, Stephen Flowerday
ACISP
2005
Springer
14 years 3 months ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
CHIMIT
2009
ACM
14 years 4 months ago
A case study of enterprise identity management system adoption in an insurance organization
This case study describes the adoption of an enterprise identity management(IdM) system in an insurance organization. We describe the state of the organization before deploying th...
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...
GI
2008
Springer
13 years 11 months ago
Von der Accountverwaltung zum erweiterten Identity Management
Abstract: Das Identity Management (IDM) an Hochschulen ist in der Praxis angekommen und muss sich in der Realit¨at bew¨ahren. Hierzu z¨ahlt einerseits die Integration von Datenb...
Tarik Gasmi, Gerhard Schneider, Dirk von Suchodole...