Sciweavers

4320 search results - page 25 / 864
» Identity management architecture
Sort
View
EATIS
2009
ACM
14 years 1 months ago
Towards dynamic trust establishment for identity federation
Federation has emerged as a key concept for identity management, as it is the basis to reduce complexity in the companies and improve user experience. However, the problem of esta...
Florina Almenárez Mendoza, Patricia Arias, ...
IDTRUST
2010
ACM
14 years 3 months ago
CardSpace-liberty integration for CardSpace users
Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of inter...
Haitham S. Al-Sinani, Waleed A. Alrodhan, Chris J....
IACR
2011
128views more  IACR 2011»
12 years 9 months ago
Identity-Based Cryptography for Cloud Security
—Cloud computing is a style of computing in which dynamically scalable and commonly virtualized resources are provided as a service over the Internet. This paper, first presents ...
Hongwei Li, Yuanshun Dai, Bo Yang
SEC
2007
13 years 11 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
ICCAD
1999
IEEE
79views Hardware» more  ICCAD 1999»
14 years 2 months ago
Improved interconnect sharing by identity operation insertion
This paper presents an approach to reduce interconnect cost by insertion of identity operations in a CDFG. Other than previous approaches, it is based on systematic pattern analys...
Dirk Herrmann, Rolf Ernst