Sciweavers

4320 search results - page 22 / 864
» Identity management architecture
Sort
View
DIM
2005
ACM
13 years 11 months ago
DECIDE: a scheme for decentralized identity escrow
Noburou Taniguchi, Koji Chida, Osamu Shionoiri, At...
NORDSEC
2009
Springer
14 years 2 months ago
Security Usability of Petname Systems
Abstract. To have certainty about identities is crucial for secure communication in digital environments. The number of digital identities that people and organizations need to man...
Md. Sadek Ferdous, Audun Jøsang, Kuldeep Si...
COLCOM
2007
IEEE
14 years 4 months ago
Towards trust-aware access management for ad-hoc collaborations
—In an ad-hoc collaborative sharing environment, attribute-based access control provides a promising approach in defining authorization over shared resources based on users’ p...
Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin H...
CORR
2006
Springer
104views Education» more  CORR 2006»
13 years 10 months ago
Unmanaged Internet Protocol: Taming the Edge Network Management Crisis
Though appropriate for core Internet infrastructure, the Internet Protocol is unsuited to routing within and between emerging ad-hoc edge networks due to its dependence on hierarc...
Bryan Ford
AINA
2006
IEEE
14 years 3 months ago
Distributed Key Management for Secure Role based Messaging
Secure Role Based Messaging (SRBM) augments messaging systems with role oriented communication in a secure manner. Role occupants can sign and decrypt messages on behalf of roles....
Gansen Zhao, Sassa Otenko, David W. Chadwick