Sciweavers

4320 search results - page 17 / 864
» Identity management architecture
Sort
View
IJCMAM
2010
160views more  IJCMAM 2010»
13 years 7 months ago
Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records
Commercial Web-based Personal-Health Record (PHR) systems can help patients to share their personal health records (PHRs) anytime from anywhere. PHRs are very sensitive data and an...
Luan Ibraimi, Qiang Tang, Pieter H. Hartel, Willem...
INFOCOM
2006
IEEE
14 years 3 months ago
A Node Identity Internetworking Architecture
— The Internet consists of independent networks that belong to different administrative domains and vary in scope from personal area networks, private home networks, corporate ne...
Bengt Ahlgren, Jari Arkko, Lars Eggert, Jarno Raja...
IDTRUST
2010
ACM
14 years 4 months ago
Biometrics-based identifiers for digital identity management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
SOUPS
2009
ACM
14 years 4 months ago
A multi-method approach for user-centered design of identity management systems
Pooya Jaferian, David Botta, Kirstie Hawkey, Konst...