The notion of Federated Data Warehouse Architecture was suggested for various reasons: bigger autonomy of divisions in an organization, better adaptation to user needs, bigger effi...
Achieving data security over cooperating web services is becoming a reality, but existing XML access control architectures do not consider this federated service computing. In this...
Erwin Leonardi, Sourav S. Bhowmick, Mizuho Iwaihar...
Public Key technology is about multiple parties across different domains making assertions that can be chained together to make trust judgments. Today, the need for more interoper...
Mainly for scalability reasons, many cryptographic security protocols make use of public key cryptography and require the existence of a corresponding public key infrastructure (P...
In this paper, we describe the challenges in using Personal Identity Verification (PIV) cards and PIV-like cards as federated identities to authenticate to US Federal government f...