Sciweavers

54 search results - page 5 / 11
» Integrating user Identity Management systems with the Host I...
Sort
View
JSW
2007
124views more  JSW 2007»
13 years 7 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
NDSS
2006
IEEE
14 years 1 months ago
Inoculating SSH Against Address Harvesting
Address harvesting is the act of searching a compromised host for the names and addresses of other targets to attack, such as occurs when an email virus locates target addresses f...
Stuart E. Schechter, Jaeyeon Jung, Will Stockwell,...
IH
1998
Springer
13 years 11 months ago
Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System
Abstract. Currently knownbasic anonymitytechniques dependon identity veri cation. If veri cation of user identities is not possible due to the related management overhead or a gene...
Dogan Kesdogan, Jan Egner, Roland Büschkes
JUCS
2010
176views more  JUCS 2010»
13 years 2 months ago
Integrating Personal Web Data through Semantically Enhanced Web Portal
: Currently, the World Wide Web is mostly composed of isolated and loosely connected "data islands". Connecting them together and retrieving only the information that is ...
Lidia Rovan, Tomislav Jagust, Mirta Baranovic
ITCC
2003
IEEE
14 years 24 days ago
A Federated Model for Secure Web-Based Videoconferencing
This paper describes efforts underway within Internet2 to create a secure federated IP based videoconferencing model. The objective is to create an environment that is user-friend...
Douglas C. Sicker, Ameet Kulkarni, Anand Chavali, ...