-
1
-
-
34547404349
-
User centricity: A taxonomy and open issues
-
Virginia, November
-
A. Bhargav-Spantzel, J. Camenisch, T. Gross and D. Sommer, "User centricity: a taxonomy and open issues", Proceedings of the second ACM workshop on Digital Identity Management, DIM'06, Virginia, November 2006.
-
(2006)
Proceedings of the second ACM workshop on Digital Identity Management, DIM'06
-
-
Bhargav-Spantzel, A.1
Camenisch, J.2
Gross, T.3
Sommer, D.4
-
2
-
-
33646131730
-
-
Microsoft Corporation White Paper, 05/12/2005, Online, Available
-
K. Cameron, "The laws of identity", Microsoft Corporation White Paper, 05/12/2005. [Online]. Available: http://msdn2.microsoft.com/enus/ library/ms996456.aspx
-
The laws of identity
-
-
Cameron, K.1
-
5
-
-
47849103698
-
-
Online, Available
-
"EU directive on privacy," 1995. [Online]. Available:www.cdt. org/privacy/eudirective/EU Directive.html
-
(1995)
EU directive on privacy
-
-
-
7
-
-
84876196891
-
Children's online privacy protection act
-
Online, Available
-
"Children's online privacy protection act." [Online]. Available:www.cdt.org/legislation/105th/privacy/64fr59888.pdf
-
-
-
-
8
-
-
51349132233
-
-
Can-spam act. [Online]. Available: www.ftc.gov/bcp/conline/ edcams/spam/rules.htm
-
"Can-spam act." [Online]. Available: www.ftc.gov/bcp/conline/ edcams/spam/rules.htm
-
-
-
-
9
-
-
51349129523
-
-
U.S. federal laws, Online, Available
-
"U.S. federal laws." [Online]. Available: www.ftc.gov/privacy/ index.html
-
-
-
-
10
-
-
47849129409
-
Senate bill 1386
-
Online, Available
-
"Senate bill 1386," 2002. [Online]. Available: info.sen.ca.gov/pub/01-02/bill/sen/sb 1351-1400/sb 1386 bill 20020926 chaptered.html
-
(2002)
-
-
-
11
-
-
51349141132
-
-
C. Union, Notice of security breach state laws, 2007. [Online]. Available: www.consumersunion.org/campaigns/Breach laws May 05.pdf
-
C. Union, "Notice of security breach state laws," 2007. [Online]. Available: www.consumersunion.org/campaigns/Breach laws May 05.pdf
-
-
-
-
14
-
-
0012247244
-
Global identity management to boost personalization
-
Basel, Switzerland, September
-
M. Koch, "Global identity management to boost personalization," in Ninth Research Symposium on Emerging Electronic Markets, Basel, Switzerland, September 2002.
-
(2002)
Ninth Research Symposium on Emerging Electronic Markets
-
-
Koch, M.1
-
15
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
16
-
-
51349166061
-
-
S. Clau, A. Pfitzmann, M. Hansen, and E. Van Herreweghen, The IPTS Report, Special Issue: Identity and Privacy, pp. 8-16, 2002.
-
S. Clau, A. Pfitzmann, M. Hansen, and E. Van Herreweghen, The IPTS Report, Special Issue: Identity and Privacy, pp. 8-16, 2002.
-
-
-
-
17
-
-
2442547465
-
Ensuring information assurance in federated identity management
-
Phoenix, Arizona, USA, April
-
D. Shin, G.-J. Ahn, and P. Shenoy, "Ensuring information assurance in federated identity management," in 23rd IEEE International Performance Computing and Communications Conference (IPCCC), Phoenix, Arizona, USA, April 2004.
-
(2004)
23rd IEEE International Performance Computing and Communications Conference (IPCCC)
-
-
Shin, D.1
Ahn, G.-J.2
Shenoy, P.3
-
18
-
-
33746653938
-
Managing privacy preferences for federated identity management
-
Fairfax, Virginia, USA
-
G.-J. Ahn and J. Lam, "Managing privacy preferences for federated identity management," in 2005 workshop on Digital identity management, Fairfax, Virginia, USA, 2005.
-
(2005)
2005 workshop on Digital identity management
-
-
Ahn, G.-J.1
Lam, J.2
-
19
-
-
51349084849
-
-
F. T. Commission, Online profiling - a report to congress, part 2, Tech. Rep., 2002.
-
F. T. Commission, "Online profiling - a report to congress, part 2," Tech. Rep., 2002.
-
-
-
-
20
-
-
84964426510
-
Implementation of an authenticated dictionary with skip lists and commutative hashing
-
IEEE Press
-
Goodrich, M. T., Tamassia, R., & Schwerin, A., "Implementation of an authenticated dictionary with skip lists and commutative hashing", DARPA Information Survivability Conference & Exposition II (DISCEX II), IEEE Press, 2001, 68-82.
-
(2001)
DARPA Information Survivability Conference & Exposition II (DISCEX
, vol.2
, pp. 68-82
-
-
Goodrich, M.T.1
Tamassia, R.2
Schwerin, A.3
-
21
-
-
0141873829
-
Efficient authenticated dictionaries with skip lists and commutative hashing
-
Technical Report, Johns Hopkins Information, Security Institute
-
Goodrich, M. T.. & Tamassia, R., "Efficient authenticated dictionaries with skip lists and commutative hashing", Technical Report, Johns Hopkins Information, Security Institute, 2000.
-
(2000)
-
-
Goodrich, M.T.1
Tamassia, R.2
-
22
-
-
51349122423
-
-
Cormen, T., Leiserson, C., Rivest, R., & Stein, C. Introduction to Algorithms. MIT Press, 2001. Knuth, D., The Art of Computer Programming, 2: Seminumerical Algorithms, Addison-Wesley, 1997.
-
Cormen, T., Leiserson, C., Rivest, R., & Stein, C. Introduction to Algorithms. MIT Press, 2001. Knuth, D., The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Addison-Wesley, 1997.
-
-
-
-
23
-
-
0003294665
-
The Art of Computer Programming
-
Addison-Wesley
-
Knuth, D., The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Addison-Wesley, 1997.
-
(1997)
Seminumerical Algorithms
, vol.2
-
-
Knuth, D.1
-
24
-
-
58349114203
-
Establishing and protecting digital identity in federation systems
-
Virginia, November
-
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino, "Establishing and protecting digital identity in federation systems," Proceedings of the second ACM workshop on Digital Identity Management, DIM'05, Virginia, November 2005.
-
(2005)
Proceedings of the second ACM workshop on Digital Identity Management, DIM'05
-
-
Bhargav-Spantzel, A.1
Squicciarini, A.C.2
Bertino, E.3
|