This paper describes SHAD, a novel architecture for security in pervasive computing environments, and a prototype implementation. SHAD is a Peer-to-Peer and humancentered security...
Enrique Soriano, Francisco J. Ballesteros, Gorka G...
— This paper proposes an authentication approach to support multi-clients in using a multi-application based environment. The approach is primarily based on the public key infras...
Single-Sign-On (SSO) protocols enable companies to establish a federated environment in which clients sign in the system once and yet are able to access to services offered by dif...
In enterprise environment, security becomes increasingly important and costly. Enterprises are struggling to protect the increasing amount of disparate resources. Simple patchwork ...
Chen Zhao, Yang Chen, Dawei Xu, NuerMaimaiti Heili...
Abstract—Identity Management (IdM) on the application layer improves the usability and security for end users by offering features like Single Sign-On and attribute provisioning....