메뉴 건너뛰기




Volumn , Issue , 2006, Pages 1-10

User centricity: A taxonomy and open issues

Author keywords

Delegation; Identity management systems; Privacy; Security; Taxonomy; User centric; User control

Indexed keywords

FEDERATED IDENTITY MANAGEMENT (FIM); IDENTITY MANAGEMENT SYSTEMS; USER CENTRICITY; USER CONTROL;

EID: 34547404349     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1179529.1179531     Document Type: Conference Paper
Times cited : (41)

References (36)
  • 1
  • 2
    • 0002885224 scopus 로고    scopus 로고
    • Prudent engineering practice for cryptographic protocols
    • ABADI, M., AND NEEDHAM, R. Prudent engineering practice for cryptographic protocols. IEEE Transactions on Software Engineering 22, 1 (1996), 6-15.
    • (1996) IEEE Transactions on Software Engineering , vol.22 , Issue.1 , pp. 6-15
    • ABADI, M.1    NEEDHAM, R.2
  • 5
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • BLAZE, M., FEIGENBAUM, J., AND KEROMYTIS, A. D. KeyNote: Trust management for public-key infrastructures (position paper). Lecture Notes in Computer Science 1550 (1999), 59-63.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • BLAZE, M.1    FEIGENBAUM, J.2    KEROMYTIS, A.D.3
  • 6
    • 34249898231 scopus 로고    scopus 로고
    • Decentralized trust management
    • Tech. Rep. 96-17, 28
    • BLAZE, M., FEIGENBAUM, J., AND LACY, J. Decentralized trust management. Tech. Rep. 96-17, 28, 1996.
    • (1996)
    • BLAZE, M.1    FEIGENBAUM, J.2    LACY, J.3
  • 9
    • 34547424582 scopus 로고    scopus 로고
    • CAMENISCH, J. Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v.1.2. In Proceedings of the 21st IFIP International Information Security Conference (SEC 2006) (2006).
    • CAMENISCH, J. Protecting (anonymous) credentials with the trusted computing group's trusted platform modules v.1.2. In Proceedings of the 21st IFIP International Information Security Conference (SEC 2006) (2006).
  • 10
    • 84945135810 scopus 로고    scopus 로고
    • CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. in Advances in Cryptology -EUROCRYPT 2001 (2001), B. Pfitzmann, Ed., 2045 of LNCS. Springer Verlag, pp. 93-118.
    • CAMENISCH, J., AND LYSYANSKAYA, A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. in Advances in Cryptology -EUROCRYPT 2001 (2001), B. Pfitzmann, Ed., vol. 2045 of LNCS. Springer Verlag, pp. 93-118.
  • 11
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Advances in Cryptology -CRYPTO 2002 , M. Yung, Ed, of, Springer Verlag, pp
    • CAMENISCH, J., AND LYSYANSKAYA, A. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology -CRYPTO 2002 (2002), M. Yung, Ed., vol. 2442 of LNCS, Springer Verlag, pp. 61-76.
    • (2002) LNCS , vol.2442 , pp. 61-76
    • CAMENISCH, J.1    LYSYANSKAYA, A.2
  • 12
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Advances in Cryptology -CRYPTO 2004 , Springer Verlag
    • CAMENISCH, J., AND LYSYANSKAYA, A. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology -CRYPTO 2004 (2004), LNCS, Springer Verlag.
    • (2004) LNCS
    • CAMENISCH, J.1    LYSYANSKAYA, A.2
  • 13
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Advances in Cryptology, CRYPTO 2003 , D. Boneh, Ed
    • CAMENISCH, J., AND SHOUP, V. Practical verifiable encryption and decryption of discrete logarithms. In Advances in Cryptology - CRYPTO 2003 (2003), D. Boneh, Ed., LNCS.
    • (2003) LNCS
    • CAMENISCH, J.1    SHOUP, V.2
  • 16
    • 85119830099 scopus 로고    scopus 로고
    • On signatures of knowledge. Cryptology ePrint Archive
    • Report 2006/184
    • CHASE, M., AND LYSYANSKAYA, A. On signatures of knowledge. Cryptology ePrint Archive, Report 2006/184, 2006.
    • (2006)
    • CHASE, M.1    LYSYANSKAYA, A.2
  • 18
    • 85033903396 scopus 로고
    • Directive 95/46/ec of the european parliament and the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data
    • EUROPEAN PARLIAMENT
    • EUROPEAN PARLIAMENT. Directive 95/46/ec of the european parliament and the council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal of the European Communities (1995).
    • (1995) Official Journal of the European Communities
  • 21
    • 34547418335 scopus 로고    scopus 로고
    • HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002. Status: Informational.
    • HOUSLEY, R., POLK, W., FORD, W., AND SOLO, D. RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, Apr. 2002. Status: Informational.
  • 22
    • 34547482659 scopus 로고    scopus 로고
    • IDENTITY-MANAGEMENT. Liberty alliance project. http://www.projectliberty.org.
    • IDENTITY-MANAGEMENT. Liberty alliance project. http://www.projectliberty.org.
  • 23
    • 84858098605 scopus 로고    scopus 로고
    • INTERNET2
    • INTERNET2. Shibboleth, http://shibboleth.internet2.edu.
    • Shibboleth
  • 24
    • 34547436511 scopus 로고    scopus 로고
    • J. MERRELS, SXIP IDENTITY. DIX: Digital Identity Exchange Protocol. Internet Draft, March 2006.
    • J. MERRELS, SXIP IDENTITY. DIX: Digital Identity Exchange Protocol. Internet Draft, March 2006.
  • 28
    • 34547466918 scopus 로고    scopus 로고
    • LIBERTY ALLIANCE. Liberty alliance id-ff 1.2 specifications. Available at http://www.projectliberty.org.
    • LIBERTY ALLIANCE. Liberty alliance id-ff 1.2 specifications. Available at http://www.projectliberty.org.
  • 29
    • 84858094562 scopus 로고    scopus 로고
    • LÜER, C., AND VAN DER HOEK, A. Jploy: User-centric deployment support in a component platform.
    • LÜER, C., AND VAN DER HOEK, A. Jploy: User-centric deployment support in a component platform.
  • 30
    • 84858094563 scopus 로고    scopus 로고
    • LYSYANSKAYA, A., RIVEST, R., SARAI, Á., AND WOLF, S. Pseudonym systems. In Selected Areas in Cryptography (1999), H. Heys and C. Adams, Eds., 1758 of LNCS, Springer Verlag.
    • LYSYANSKAYA, A., RIVEST, R., SARAI, Á., AND WOLF, S. Pseudonym systems. In Selected Areas in Cryptography (1999), H. Heys and C. Adams, Eds., vol. 1758 of LNCS, Springer Verlag.
  • 31
    • 34547431766 scopus 로고    scopus 로고
    • MICROSOFT. A technical reference for InfoCard v1.0 in windows, 2005.
    • MICROSOFT. A technical reference for InfoCard v1.0 in windows, 2005.
  • 32
    • 0003508562 scopus 로고    scopus 로고
    • NATIONAL INSTITUTE FOR STANDARDS AND TECHNOLOGY NIST, dss
    • NATIONAL INSTITUTE FOR STANDARDS AND TECHNOLOGY (NIST). Digital signature standard (dss), 2000.
    • (2000) Digital signature standard
  • 33
    • 34547406429 scopus 로고    scopus 로고
    • OASIS STANDARD. Security assertion markup language (SAML) V2.0, 2005.
    • OASIS STANDARD. Security assertion markup language (SAML) V2.0, 2005.
  • 36
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • Feb
    • RIVEST, R., SHAMIR, Á., AND ADLEMAN, L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21, 2 (Feb. 1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • RIVEST, R.1    SHAMIR, A.2    ADLEMAN, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.