Sciweavers

186 search results - page 30 / 38
» Managing privacy preferences for federated identity manageme...
Sort
View
ACSAC
2005
IEEE
14 years 1 months ago
Layering Public Key Distribution Over Secure DNS using Authenticated Delegation
We present the Internet Key Service (IKS), a distributed architecture for authenticated distribution of public keys, layered on Secure DNS (DNSSEC). Clients use DNSSEC to securely...
John P. Jones, Daniel F. Berger, Chinya V. Ravisha...
WPES
2003
ACM
14 years 26 days ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
ACISP
2000
Springer
13 years 12 months ago
PKI Seeks a Trusting Relationship
All human co-operation is based on trust, meaning that we choose co-operation partners and make commitment decisions based on how much we trust the other party. Digital certificat...
Audun Jøsang, Ingar Glenn Pedersen, Dean Po...
IV
2010
IEEE
140views Visualization» more  IV 2010»
13 years 6 months ago
GVIS: An Integrating Infrastructure for Adaptively Mashing up User Data from Different Sources
In this article we present an infrastructure for creating mash up visual representations of the user profile that combines data from different sources. We explored this approach ...
Luca Mazzola, Riccardo Mazza
ESORICS
2005
Springer
14 years 1 months ago
Minimal Disclosure in Hierarchical Hippocratic Databases with Delegation
Abstract. Hippocratic Databases have been proposed as a mechanism to guarantee the respect of privacy principles in data management. We argue that three major principles are missin...
Fabio Massacci, John Mylopoulos, Nicola Zannone