Sciweavers

4320 search results - page 9 / 864
» Identity management architecture
Sort
View
DIM
2008
ACM
13 years 10 months ago
Symmetric identity federation for fixed-mobile convergence
Makiko Aoyagi, Tsuyoshi Abe, Kenji Takahashi
IEEEARES
2007
IEEE
14 years 2 months ago
Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management
The catchword “compliance” dominates the actual debate about Identity Management and information security like few before. Companies need to comply with a variety of internal ...
Ludwig Fuchs, Günther Pernul
CCGRID
2002
IEEE
14 years 1 months ago
Agent-Based Resource Management for Grid Computing
It is envisaged that the grid infrastructure will be a large-scale distributed software system that will provide high-end computational and storage capabilities to differentiated ...
Junwei Cao, Daniel P. Spooner, James D. Turner, St...
GLOBECOM
2008
IEEE
14 years 3 months ago
Diameter WebAuth: An AAA-Based Identity Management Framework for Web Applications
Abstract—With an increasing number of personalized information and services offered on the Internet, especially the World Wide Web, effective identity management solutions are de...
Niklas Neumann, Xiaoming Fu
DBSEC
2006
134views Database» more  DBSEC 2006»
13 years 10 months ago
Notarized Federated Identity Management for Web Services
We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary servi...
Michael T. Goodrich, Roberto Tamassia, Danfeng Yao