Sciweavers

1663 search results - page 5 / 333
» Privacy and Identity Management
Sort
View
IADIS
2004
13 years 8 months ago
Authorization of User Profile Access in Identity Management
Distributed management of user profiles and identities allow reuse of profile information for different personalization services but also raises privacy issues. Users need a possi...
Wolfgang Woerndl
IDTRUST
2009
ACM
14 years 2 months ago
Personal identity verification (PIV) cards as federated identities: challenges and opportunities
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...
Sarbari Gupta
ISI
2008
Springer
13 years 7 months ago
Identity management architecture
Identity Management plays a crucial role in many application contexts, including e-governments, e-commerce, business intelligence, investigation, and homeland security. The variet...
Uwe Glässer, Mona Vajihollahi
HICSS
2006
IEEE
137views Biometrics» more  HICSS 2006»
14 years 1 months ago
Identity Management and Data Sharing in the European Union
Citizens and enterprises in the European Union benefit from a common internal market and other freedoms. The resulting and growing mobility and cross-border collaboration necessit...
Benoît Otjacques, Patrik Hitzelberger, Ferna...
IEEESCC
2007
IEEE
14 years 1 months ago
Enabling User Control with Personal Identity Management
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breac...
Ty Mey Eap, Marek Hatala, Dragan Gasevic