Sciweavers

109 search results - page 1 / 22
» Trust Negotiation in Identity Management
Sort
View
IEEESP
2007
47views more  IEEESP 2007»
13 years 10 months ago
Trust Negotiation in Identity Management
Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciari...
DIM
2008
ACM
14 years 20 days ago
Minimal credential disclosure in trust negotiations
The secure release of identity attributes is a key enabler for electronic business interactions. In particular, integrity and confidentiality of identity attributes are two key re...
Federica Paci, David Bauer, Elisa Bertino, Douglas...
NDSS
2002
IEEE
14 years 3 months ago
Advanced Client/Server Authentication in TLS
Many business transactions on the Internet occur between strangers, that is, between entities with no prior relationship and no common security domain. Traditional security approa...
Adam Hess, Jared Jacobson, Hyrum Mills, Ryan Wamsl...
SRDS
2010
IEEE
13 years 8 months ago
Protection of Identity Information in Cloud Computing without Trusted Third Party
Cloud computing allows the use of Internet-based services to support business processes and rental of IT-services on a utility-like basis. It offers a concentration of resources bu...
Rohit Ranchal, Bharat K. Bhargava, Lotfi Ben Othma...
POLICY
2005
Springer
14 years 4 months ago
Driving and Monitoring Provisional Trust Negotiation with Metapolicies
We introduce the provisional trust negotiation framework PROTUNE, for combining distributed trust management policies with provisional-style business rules and accesscontrol relat...
Piero A. Bonatti, Daniel Olmedilla