-
1
-
-
72849117898
-
-
German Research Project
-
German Research Project, http://www.mobis-pro.de, 2009.
-
(2009)
-
-
-
2
-
-
50649121444
-
-
K. Daniel, T. Tran, C. Wietfeld: Interoperable Role-Based Single Sign-On-Access to Distributed Public Authority Information Systems, 2008 IEEE Technologies for Homeland Security Conference, Boston, MA, USA, May 2008.
-
K. Daniel, T. Tran, C. Wietfeld: Interoperable Role-Based Single Sign-On-Access to Distributed Public Authority Information Systems, 2008 IEEE Technologies for Homeland Security Conference, Boston, MA, USA, May 2008.
-
-
-
-
3
-
-
33846685793
-
An integrated approach to federated identity and privilege management in open systems
-
pages:, New York, NY, USA
-
R. Bhatti, E. Bertino, A. Ghafoor: An integrated approach to federated identity and privilege management in open systems, Communications of the ACM, pages: 81-87, New York, NY, USA, 2007.
-
(2007)
Communications of the ACM
, pp. 81-87
-
-
Bhatti, R.1
Bertino, E.2
Ghafoor, A.3
-
4
-
-
33645654854
-
Federated Identity-Management Protocols, Security Protocols
-
ISBN: 978-3-540-28389-8, Springer-Verlag, Berlin Heidelberg, September
-
B. Pfitzmann, M. Waidner: Federated Identity-Management Protocols, Security Protocols, LNCS 3364, pp. 153-174, ISBN: 978-3-540-28389-8, Springer-Verlag, Berlin Heidelberg, September 2005.
-
(2005)
LNCS
, vol.3364
, pp. 153-174
-
-
Pfitzmann, B.1
Waidner, M.2
-
5
-
-
38949134629
-
-
Security Services Technical Committee of OASIS
-
N. Ragouzis, J.Hughes, R. Philpott, E. Maler, P. Madsen, T. Scavo: Security assertion markup language (saml) v2.0 technical overview, Security Services Technical Committee of OASIS, 2008. http://www.oasis-open.org.
-
(2008)
Security assertion markup language (saml) v2.0 technical overview
-
-
Ragouzis, N.1
Hughes, J.2
Philpott, R.3
Maler, E.4
Madsen, P.5
Scavo, T.6
-
6
-
-
34547448344
-
Openid 2.0: A platform for user-centric identity management
-
New York, NY, USA, ACM
-
D. Recordon, D. Reed: Openid 2.0: a platform for user-centric identity management, In DIM '06: Proceedings of the second ACM workshop on Digital identity management, pages 11-16, New York, NY, USA, 2006. ACM.
-
(2006)
DIM '06: Proceedings of the second ACM workshop on Digital identity management
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
7
-
-
67649884132
-
Verified implementations of the information card federated identity-management protocol
-
New York, NY, USA, ACM
-
K. Bhargavan, C. Fournet, A. D. Gordon, N. Swamy: Verified implementations of the information card federated identity-management protocol, In ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security, pages 123-135, New York, NY, USA, 2008. ACM.
-
(2008)
ASIACCS '08: Proceedings of the 2008 ACM symposium on Information, computer and communications security
, pp. 123-135
-
-
Bhargavan, K.1
Fournet, C.2
Gordon, A.D.3
Swamy, N.4
-
8
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
E. Maler, D. Reed: The venn of identity: Options and issues in federated identity management, IEEE Security and Privacy, 6(2):16-23, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
10
-
-
41949098872
-
Use cases for identity management in e-government
-
March-April
-
R. McKenzie, M. Crompton, and C. Wallis: Use cases for identity management in e-government. Security and Privacy, IEEE, 6(2):51-57, March-April 2008.
-
(2008)
Security and Privacy, IEEE
, vol.6
, Issue.2
, pp. 51-57
-
-
McKenzie, R.1
Crompton, M.2
Wallis, C.3
-
11
-
-
33847763273
-
Providing web service security in a federated environment
-
L. DeLooze: Providing web service security in a federated environment. IEEE Secu- rity and Privacy, 5(1):73-75, 2007.
-
(2007)
IEEE Secu- rity and Privacy
, vol.5
, Issue.1
, pp. 73-75
-
-
DeLooze, L.1
-
12
-
-
79951486278
-
SAML Based Unified Access Control Model for Inter-platform Educational Resources
-
Wuhan, Hubei, December
-
C. Shang, Z. Yang, Q. Liu, C. Zha: SAML Based Unified Access Control Model for Inter-platform Educational Resources, International Conference on Computer Science and Software Engineering, Wuhan, Hubei, December 2008.
-
(2008)
International Conference on Computer Science and Software Engineering
-
-
Shang, C.1
Yang, Z.2
Liu, Q.3
Zha, C.4
-
13
-
-
0030086382
-
Role-Based Access Control Models
-
R. Sandhu, E. Coyne, H. Feinstein, C. Youman: Role-Based Access Control Models, Computer, 29(2):38-47, 1996.
-
(1996)
Computer
, vol.29
, Issue.2
, pp. 38-47
-
-
Sandhu, R.1
Coyne, E.2
Feinstein, H.3
Youman, C.4
-
14
-
-
52249085869
-
Enhanced Search Method for Ontology Classification
-
pages:, July
-
J. Kim, S. Kwon, Y. Park: Enhanced Search Method for Ontology Classification, IEEE International Workshop on Semantic Computing and Applications IWSCA '08, pages: 12-18, July 2008.
-
(2008)
IEEE International Workshop on Semantic Computing and Applications IWSCA '08
, pp. 12-18
-
-
Kim, J.1
Kwon, S.2
Park, Y.3
-
15
-
-
72849119204
-
-
IETF, The Transport Layer Security (TLS) Protocol Version 1.2
-
IETF, The Transport Layer Security (TLS) Protocol Version 1.2, http://www.ietf.org
-
-
-
-
17
-
-
70350635715
-
Secure and Reliable Communication Infrastructure for a Distributed IT-Federation, Mobile Response
-
ISBN: 978-3-642-00439-1, Springer-Verlag, Berlin Heidelberg, February
-
T. Tran, K. Daniel, C. Wietfeld: Secure and Reliable Communication Infrastructure for a Distributed IT-Federation, Mobile Response, LNCS 5424, pp. 138-147, ISBN: 978-3-642-00439-1, Springer-Verlag, Berlin Heidelberg, February 2009.
-
(2009)
LNCS
, vol.5424
, pp. 138-147
-
-
Tran, T.1
Daniel, K.2
Wietfeld, C.3
-
18
-
-
34547441569
-
Avoidance of performance bottlenecks caused by http redirect in identity management protocols
-
New York, NY, USA
-
Y. Takeda, S. Kondo, Y. Kitayama, M. Torato, T. Motegi: Avoidance of performance bottlenecks caused by http redirect in identity management protocols, In DIM 06: Proceedings of the second ACM workshop on Digital identity management, pages 25-32, New York, NY, USA, 2006.
-
(2006)
DIM 06: Proceedings of the second ACM workshop on Digital identity management
, pp. 25-32
-
-
Takeda, Y.1
Kondo, S.2
Kitayama, Y.3
Torato, M.4
Motegi, T.5
-
19
-
-
72849146789
-
-
J. A. Project, Apache JMeter, Apache Project Homepage: http://jakarta.apache.org/jmeter
-
J. A. Project, Apache JMeter, Apache Project Homepage: http://jakarta.apache.org/jmeter
-
-
-
|