Sciweavers

186 search results - page 13 / 38
» Managing privacy preferences for federated identity manageme...
Sort
View
ACISP
2005
Springer
14 years 1 months ago
Group Signature Where Group Manager, Members and Open Authority Are Identity-Based
We present the first group signature scheme with provable security and signature size O(λ) bits where the group manager, the group members, and the Open Authority (OA) are all id...
Victor K. Wei, Tsz Hon Yuen, Fangguo Zhang
JSW
2007
124views more  JSW 2007»
13 years 7 months ago
Shibboleth as a Tool for Authorized Access Control to the Subversion Repository System
—Shibboleth is an architecture and protocol for allowing users to authenticate and be authorized to use a remote resource by logging into the identity management system that is m...
Linh Ngo, Amy W. Apon
MHCI
2005
Springer
14 years 1 months ago
Dynamic privacy management: a plug-in service for the middleware in pervasive computing
Context-aware applications can better meet users’ needs when sensing agents installed in the environment automatically provide input relevant to the application. However, this n...
Dan Hong, Mingxuan Yuan, Vincent Y. Shen
ECSCW
2001
13 years 9 months ago
Community support and identity management
Computer based community support systems can provide powerful support in direct exchange of information and in finding people for information exchange Such applications usually mak...
Michael Koch, Wolfgang Wörndl
SEMWEB
2007
Springer
14 years 1 months ago
Privacy and Capability Management for the European eIDM Framework
The natural evolution of eGovernment is to go beyond the management of identities and therefore it is necessary to manage people, companies or organizations, and their capabilities...
Mario Reyes-Ayala, Ignacio Alamillo, Daniel Chavar...