메뉴 건너뛰기




Volumn 15, Issue 5, 2007, Pages 493-527

User centricity: A taxonomy and open issues

Author keywords

Identity management; Privacy; Security

Indexed keywords

ABSTRACTING; ACCESS CONTROL; CRYPTOGRAPHY; DATA PRIVACY; NETWORK PROTOCOLS; USABILITY ENGINEERING; USER INTERFACES;

EID: 34547522957     PISSN: 0926227X     EISSN: None     Source Type: Journal    
DOI: 10.3233/JCS-2007-15502     Document Type: Conference Paper
Times cited : (30)

References (50)
  • 5
    • 84957800809 scopus 로고    scopus 로고
    • KeyNote: Trust management for public-key infrastructures (position paper)
    • M. Blaze, J. Feigenbaum and A.D. Keromytis, KeyNote: Trust management for public-key infrastructures (position paper), Lecture Notes in Computer Science 1550 (1999), 59-63.
    • (1999) Lecture Notes in Computer Science , vol.1550 , pp. 59-63
    • Blaze, M.1    Feigenbaum, J.2    Keromytis, A.D.3
  • 6
    • 34249898231 scopus 로고    scopus 로고
    • Decentralized trust management
    • Technical Report 96-17, 28
    • M. Blaze, J. Feigenbaum and J. Lacy, Decentralized trust management. Technical Report 96-17, 28, 1996.
    • (1996)
    • Blaze, M.1    Feigenbaum, J.2    Lacy, J.3
  • 11
    • 33749684958 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system, with optional anonymity revocation
    • 3295, IBM Research Division, November
    • J. Camenisch and A. Lysyanskaya, Efficient non-transferable anonymous multi-show credential system, with optional anonymity revocation, Technical Report Research Report RZ 3295, IBM Research Division, November 2000.
    • (2000) Technical Report Research Report RZ
    • Camenisch, J.1    Lysyanskaya, A.2
  • 12
    • 84945135810 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • Advances in Cryptology, EUROCRYPT 2001, Birgit Pfitzmann, ed, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation, in: Advances in Cryptology - EUROCRYPT 2001, Birgit Pfitzmann, ed., LNCS, vol. 2045, Springer-Verlag, 2001, pp. 93-118.
    • (2001) LNCS , vol.2045 , pp. 93-118
    • Camenisch, J.1    Lysyanskaya, A.2
  • 13
    • 84937428748 scopus 로고    scopus 로고
    • Dynamic accumulators and application to efficient revocation of anonymous credentials
    • Advances in Cryptology, CRYPTO 2002, Moti Yung, ed, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, Dynamic accumulators and application to efficient revocation of anonymous credentials, in: Advances in Cryptology - CRYPTO 2002, Moti Yung, ed., LNCS, vol. 2442, Springer-Verlag, 2002, pp. 61-76.
    • (2002) LNCS , vol.2442 , pp. 61-76
    • Camenisch, J.1    Lysyanskaya, A.2
  • 14
    • 35048845114 scopus 로고    scopus 로고
    • Signature schemes and anonymous credentials from bilinear maps
    • Advances in Cryptology, CRYPTO 2004, Springer-Verlag
    • J. Camenisch and A. Lysyanskaya, Signature schemes and anonymous credentials from bilinear maps, in: Advances in Cryptology - CRYPTO 2004, LNCS, vol. 3152, Springer-Verlag, 2004, pp. 56-72.
    • (2004) LNCS , vol.3152 , pp. 56-72
    • Camenisch, J.1    Lysyanskaya, A.2
  • 15
    • 35248847060 scopus 로고    scopus 로고
    • Practical verifiable encryption and decryption of discrete logarithms
    • Advances in Cryptology, CRYPTO 2003, Dan Boneh, ed
    • J. Camenisch and V. Shoup, Practical verifiable encryption and decryption of discrete logarithms, in: Advances in Cryptology - CRYPTO 2003, Dan Boneh, ed., LNCS, 2003.
    • (2003) LNCS
    • Camenisch, J.1    Shoup, V.2
  • 19
    • 85119830099 scopus 로고    scopus 로고
    • On signatures of knowledge, Cryptology ePrint Archive
    • Report 2006/184
    • M. Chase and A. Lysyanskaya, On signatures of knowledge, Cryptology ePrint Archive, Report 2006/184, 2006. http://eprint.iacr.org/
    • (2006)
    • Chase, M.1    Lysyanskaya, A.2
  • 23
    • 85039200595 scopus 로고
    • 1995 on the protection of individuals with, regard to the processing of personal data and on the free movement of such data
    • European Parliament, Directive 95/46/ec of the European Parliament and the Council of 24 October
    • European Parliament, Directive 95/46/ec of the European Parliament and the Council of 24 October 1995 on the protection of individuals with, regard to the processing of personal data and on the free movement of such data, Official, Journal of the European Communities, 1995.
    • (1995) Official, Journal of the European Communities
  • 24
    • 84990731886 scopus 로고
    • How to prove yourself: Practical solutions to identification and signature problems
    • Advances in Cryptology, CRYPTO '86, A.M. Odlyzko, ed, SpringerVerlag
    • A. Fiat and A. Shamir, How to prove yourself: Practical solutions to identification and signature problems, in: Advances in Cryptology - CRYPTO '86, A.M. Odlyzko, ed., LNCS, vol. 263, SpringerVerlag, 1987, pp. 186-194.
    • (1987) LNCS , vol.263 , pp. 186-194
    • Fiat, A.1    Shamir, A.2
  • 27
    • 85039241294 scopus 로고    scopus 로고
    • R. Housley, W. Polk, W. Ford and D. Solo, RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, April 2002. Status: Informational.
    • R. Housley, W. Polk, W. Ford and D. Solo, RFC 3280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, April 2002. Status: Informational.
  • 29
    • 84858098605 scopus 로고    scopus 로고
    • Internet
    • Internet, Shibboleth, http://shibboleth.internet2.edu
    • Shibboleth
  • 30
    • 85039188590 scopus 로고    scopus 로고
    • ISO, Annex C - the RSA public key cryptosystem, in: ISO/IEC 9594-8:1989(E), Part of ISO/IEC X.509 Draft Standard, 1989, no note.
    • ISO, Annex C - the RSA public key cryptosystem, in: ISO/IEC 9594-8:1989(E), Part of ISO/IEC X.509 Draft Standard, 1989, no note.
  • 36
    • 85039221590 scopus 로고    scopus 로고
    • C. Lüer and A. van. der Hoek, Jploy: User-centric deployment support in a component platform
    • C. Lüer and A. van. der Hoek, Jploy: User-centric deployment support in a component platform.
  • 37
    • 67651053584 scopus 로고    scopus 로고
    • Pseudonym, systems
    • Selected Areas in Cryptography, Howard Heys and Carlisle Adams, eds, Springer-Verlag
    • A. Lysyanskaya, R. Rivest, A. Sahai and S. Wolf, Pseudonym, systems, in: Selected Areas in Cryptography, Howard Heys and Carlisle Adams, eds, LNCS, vol. 1758, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1758
    • Lysyanskaya, A.1    Rivest, R.2    Sahai, A.3    Wolf, S.4
  • 38
    • 85039226976 scopus 로고    scopus 로고
    • Microsoft, A technical reference for InfoCard vl.O in windows, 2005.
    • Microsoft, A technical reference for InfoCard vl.O in windows, 2005.
  • 39
    • 34547339276 scopus 로고    scopus 로고
    • S.J. Murdoch, Hot or not: Revealing hidden services by their clock skew, in: CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2006, pp. 27-36.
    • S.J. Murdoch, Hot or not: Revealing hidden services by their clock skew, in: CCS'06: Proceedings of the 13th ACM Conference on Computer and Communications Security, ACM Press, New York, NY, USA, 2006, pp. 27-36.
  • 40
    • 0003508562 scopus 로고    scopus 로고
    • National Institute for Standards and Technology NIST, dss
    • National Institute for Standards and Technology (NIST), Digital signature standard (dss), 2000.
    • (2000) Digital signature standard
  • 41
    • 85039185774 scopus 로고    scopus 로고
    • OASIS Standard, Security assertion markup language (SAML) V2.0, 2005.
    • OASIS Standard, Security assertion markup language (SAML) V2.0, 2005.
  • 43
    • 85039228018 scopus 로고    scopus 로고
    • OpenID
    • OpenID, http://openid.net
  • 45
    • 85039179292 scopus 로고    scopus 로고
    • A. Pfitzmann and M. Köhntopp, Anonymity, unobservability, and pseudonymity, a proposal for terminology
    • A. Pfitzmann and M. Köhntopp, Anonymity, unobservability, and pseudonymity - a proposal for terminology.
  • 46
    • 85039212996 scopus 로고    scopus 로고
    • J. Postel, DoD standard Internet Protocol. RFC 760, January 1980. Obsoleted by RFC 791, updated by RFC 777.
    • J. Postel, DoD standard Internet Protocol. RFC 760, January 1980. Obsoleted by RFC 791, updated by RFC 777.
  • 49
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2) (1978), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 50
    • 85039232709 scopus 로고    scopus 로고
    • IBM Microsoft RSA VeriSign, Web Services Federation Language WS-Federation, version 1.0. July 8 2003
    • IBM Microsoft RSA VeriSign, Web Services Federation Language (WS-Federation), version 1.0. July 8 2003, http://msdn.microsoft.com/library/ default.asp?url=/library/en-us/dnglobspec/htm.l/ wsfederation.asp


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.