메뉴 건너뛰기




Volumn , Issue , 2009, Pages 504-509

Authenticated dictionary-based attribute sharing in federated identity management

Author keywords

[No Author keywords available]

Indexed keywords

CERTIFICATE REVOCATION; DEGREE OF CONTROL; FEDERATED IDENTITY; PRIVACY CONTROL; PROOF OF CONCEPT; PUBLIC-KEY INFRASTRUCTURE;

EID: 77951101272     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITNG.2009.193     Document Type: Conference Paper
Times cited : (6)

References (16)
  • 1
    • 34548037164 scopus 로고    scopus 로고
    • Managing privacy preferences for federated identity management
    • Alexandria, VA, USA, November 11
    • G.-J. Ahn and J. Lam. Managing privacy preferences for federated identity management. In Proceedings of the 2005 Workshop on Digital Identity Management, pages 28-36, Alexandria, VA, USA, November 11 2005.
    • (2005) Proceedings of the 2005 Workshop on Digital Identity Management , pp. 28-36
    • Ahn, G.-J.1    Lam, J.2
  • 8
    • 33646131730 scopus 로고    scopus 로고
    • Technical report, Microsoft White Report
    • K. Cameron. The laws of identity. Technical report, Microsoft White Report, 2005.
    • (2005) The Laws of Identity
    • Cameron, K.1
  • 9
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications of the ACM, 28(10):1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 10
    • 0027005999 scopus 로고
    • Achieving electronic privacy
    • August
    • D. Chaum. Achieving electronic privacy. Scientific American, pages 96-101, August 1992.
    • (1992) Scientific American , pp. 96-101
    • Chaum, D.1
  • 11
    • 84964426510 scopus 로고    scopus 로고
    • Implementation of an authenticated dictionary with skip lists and commutative hashing
    • M. T. Goodrich, R. Tamassia, and A. Schwerin. Implementation of an authenticated dictionary with skip lists and commutative hashing. In DISCEX II, 2001.
    • (2001) DISCEX II
    • Goodrich, M.T.1    Tamassia, R.2    Schwerin, A.3
  • 12
    • 54849408511 scopus 로고    scopus 로고
    • Trust requirements in identity management
    • Australian Computer Society
    • A. Jøsang, J. Fabre, B. Hay, J. Dalziel, and S. Pope. Trust requirements in identity management. In ACSW Frontiers, pages 99-108. Australian Computer Society, 2005.
    • (2005) ACSW Frontiers , pp. 99-108
    • Jøsang, A.1    Fabre, J.2    Hay, B.3    Dalziel, J.4    Pope, S.5
  • 14
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • Santa Barbara, CA, August 16-20
    • R. C. Merkle. A digital signature based on a conventional encryption function. In Advances in Cryptology - CRYPTO 87, pages 369-378, Santa Barbara, CA, August 16-20 1987.
    • (1987) Advances in Cryptology - CRYPTO 87 , pp. 369-378
    • Merkle, R.C.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.