메뉴 건너뛰기




Volumn , Issue , 2012, Pages 801-806

Evaluation criteria for future identity management

Author keywords

evaluation criteria; identity management; identity management system design; identity management system evaluation; identity management systems; identity management trust

Indexed keywords

COMPREHENSIVE DESIGNS; CURRENT TECHNOLOGY; EVALUATION CRITERIA; IDENTITY MANAGEMENT; IDENTITY MANAGEMENT SYSTEMS; NEW DESIGN; NEW SOLUTIONS; ON-LINE SERVICE; TRUST MANAGEMENT;

EID: 84868092711     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/TrustCom.2012.153     Document Type: Conference Paper
Times cited : (7)

References (22)
  • 3
    • 84868138042 scopus 로고    scopus 로고
    • March 15
    • OpenID version 2.0 specification. http://openid.net/specs/ openidauthentication-2-0.html , March 15 2012
    • (2012) OpenID Version 2.0 Specification
  • 6
    • 79952923605 scopus 로고    scopus 로고
    • Security and privacy enablers for future identity management systems
    • M. Barisch Security and privacy enablers for future identity management systems. Future Network and Mobile Summit, 2010, page 1, 2010.
    • (2010) Future Network and Mobile Summit, 2010 , pp. 1
    • Barisch, M.1
  • 8
    • 34547986595 scopus 로고    scopus 로고
    • User-centric identity management: New trends in standardization and regulation
    • IEEE, july-aug.
    • P. Bramhall, M. Hansen, K. Rannenberg, and T. Roessler. User-centric identity management: New trends in standardization and regulation. Security Privacy, IEEE, 5(4):84-87, july-aug. 2007.
    • (2007) Security Privacy , vol.5 , Issue.4 , pp. 84-87
    • Bramhall, P.1    Hansen, M.2    Rannenberg, K.3    Roessler, T.4
  • 10
    • 84868097890 scopus 로고    scopus 로고
    • ID: ACM; ID: ACM - Association for Computing Machinery
    • D. W. Chadwick. Federated Identity Management. 2009. ID: ACM; ID: ACM - Association for Computing Machinery.
    • (2009) Federated Identity Management
    • Chadwick, D.W.1
  • 11
    • 83255193441 scopus 로고    scopus 로고
    • Identity management directions in future internet
    • IEEE
    • K. Lampropoulos and S. Denazis. Identity management directions in future internet. Communications Magazine, IEEE, vol. 49, no. 12, pp. 74-83, 2011.
    • (2011) Communications Magazine , vol.49 , Issue.12 , pp. 74-83
    • Lampropoulos, K.1    Denazis, S.2
  • 12
    • 41949139623 scopus 로고    scopus 로고
    • The seven flaws of identity management: Usability and security challenges
    • IEEE, march-april
    • R. Dhamija and L. Dusseault. The seven flaws of identity management: Usability and security challenges. Security Privacy, IEEE, 6(2):24-29, march-april 2008.
    • (2008) Security Privacy , vol.6 , Issue.2 , pp. 24-29
    • Dhamija, R.1    Dusseault, L.2
  • 14
    • 84868134889 scopus 로고    scopus 로고
    • March 15
    • Shibboleth Protocol Specification. http://shibboleth.internet2.edu/docs/ internet2-mace-shibboleth-archprotocols-200509.pdf , March 15 2012
    • (2012) Shibboleth Protocol Specification
  • 21
    • 34248337556 scopus 로고    scopus 로고
    • Identity management
    • IEEE, may-june
    • C. Thompson and D. Thompson. Identity management. Internet Computing, IEEE, 11(3):82-85, may-june 2007.
    • (2007) Internet Computing , vol.11 , Issue.3 , pp. 82-85
    • Thompson, C.1    Thompson, D.2
  • 22
    • 80053156542 scopus 로고    scopus 로고
    • Automated security service orchestration for the identity management in web service based systems
    • R. Warschofsky. Automated security service orchestration for the identity management in web service based systems. Web Services (ICWS), 2011 IEEE International Conference on, page 596, 0
    • Web Services (ICWS), 2011 IEEE International Conference on
    • Warschofsky, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.