메뉴 건너뛰기




Volumn 14, Issue 3, 2006, Pages 269-300

Establishing and protecting digital identity in federation systems

Author keywords

Distributed hash tables; Federation; Identity management; Identity theft; Revocation; Single sign on; Zero knowledge proof

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS; INFORMATION MANAGEMENT; INFORMATION SERVICES; NETWORK PROTOCOLS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 33745459183     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2006-14303     Document Type: Article
Times cited : (38)

References (46)
  • 1
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • M. Abadi and R. Needham, Prudent engineering practice for cryptographic protocols, IEEE Trans. Softw. Eng. 22(1) (1996), 6-15.
    • (1996) IEEE Trans. Softw. Eng. , vol.22 , Issue.1 , pp. 6-15
    • Abadi, M.1    Needham, R.2
  • 4
    • 85039326968 scopus 로고    scopus 로고
    • AES. http://csrc.nist.gov/cryptotoolkit/aes/.
  • 9
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, in: Lecture Notes in Computer Science, Vol. 2139, 2001, pp. 213-240.
    • (2001) Lecture Notes in Computer Science , vol.2139 , pp. 213-240
    • Boneh, D.1    Franklin, M.2
  • 10
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, SIAM J. Comput. 32(3) (2003), 586-615.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 11
    • 0025568003 scopus 로고
    • Value exchange systems enabling security and unobservability
    • H. Buerk and A. Pfitzmann, Value exchange systems enabling security and unobservability, Computer and Security 9(9) (1990), 715-721.
    • (1990) Computer and Security , vol.9 , Issue.9 , pp. 715-721
    • Buerk, H.1    Pfitzmann, A.2
  • 14
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, Security without identification: transaction systems to make big brother obsolete, Commun. ACM 28(10) (1985), 1030-1044.
    • (1985) Commun. ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 16
    • 33745467659 scopus 로고    scopus 로고
    • A new on-line certificate validation method for improved security, scalability and interoperability
    • J.H. Choi, S.S. Lim and K. Zeilenga, A new on-line certificate validation method for improved security, scalability and interoperability, in: 6th IEEE Information Assurance Workshop, 2005.
    • (2005) 6th IEEE Information Assurance Workshop
    • Choi, J.H.1    Lim, S.S.2    Zeilenga, K.3
  • 19
    • 85039334345 scopus 로고    scopus 로고
    • IBM Zurich Research Laboratory, Privacy enhancing, Cryptography and Pseudonym Management. http://www.zurich.ibm.com/security/privacy/.
  • 21
    • 85008020099 scopus 로고    scopus 로고
    • Phishing attacks rising, but dollar losses down
    • G. Goth, Phishing attacks rising, but dollar losses down, IEEE Security and Privacy 3(1) (2005), 8.
    • (2005) IEEE Security and Privacy , vol.3 , Issue.1 , pp. 8
    • Goth, G.1
  • 24
    • 85039334152 scopus 로고    scopus 로고
    • Identity-Management, Liberty alliance project, http://www.projectliberty. org.
  • 25
    • 85039323120 scopus 로고    scopus 로고
    • Internet2, Shibboleth, http://shibboleth.internet2.edu.
  • 28
    • 85039324880 scopus 로고    scopus 로고
    • Identity Theft Management, http://www.identitytheftmanagement.com/.
  • 34
    • 85039321494 scopus 로고    scopus 로고
    • RSA Laboratories' Nightingale, http://www.rsasecurity.com/rsalabs/node. asp?id=2424.01
  • 35
    • 33745464413 scopus 로고    scopus 로고
    • Whitepaper on towards federated identity management
    • E. Norlin and A. Durand, Whitepaper on towards federated identity management, in: Ping Identity Corporation, 2002.
    • (2002) Ping Identity Corporation
    • Norlin, E.1    Durand, A.2
  • 38
    • 85009805214 scopus 로고    scopus 로고
    • Fighting spam with reputation systems
    • V.V. Prakash and A. O'Donnell, Fighting spam with reputation systems, Queue 3(9) (2005), 36-41.
    • (2005) Queue , vol.3 , Issue.9 , pp. 36-41
    • Prakash, V.V.1    O'Donnell, A.2
  • 41
    • 0000537828 scopus 로고
    • Efficient identification and signatures for smart cards
    • New York, NY, USA, Springer, New York
    • C.P. Schnorr, Efficient identification and signatures for smart cards, in: CRYPTO'89: Proceedings on Advances in cryptology, New York, NY, USA, Springer, New York, 1989, pp. 239-252.
    • (1989) CRYPTO'89: Proceedings on Advances in Cryptology , pp. 239-252
    • Schnorr, C.P.1
  • 42
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • New York, NY, USA, Springer, New York
    • A. Shamir, Identity-based cryptosystems and signature schemes, in: Proceedings of CRYPTO 84 on Advances in ciyptology, New York, NY, USA, Springer, New York, 1985, pp. 47-53.
    • (1985) Proceedings of CRYPTO 84 on Advances in Ciyptology , pp. 47-53
    • Shamir, A.1
  • 43
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • V. Shoup, Lower bounds for discrete logarithms and related problems, in: Lecture Notes in Computer Science, Vol. 1233, 1997, pp. 256-268.
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 256-268
    • Shoup, V.1
  • 44
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of PGP 5.0
    • A. Whitten and J.D. Tygar, Why Johnny can't encrypt: A usability evaluation of PGP 5.0, in: 8th USENIX Security Symposium, 1999.
    • (1999) 8th USENIX Security Symposium
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.