-
3
-
-
84868138042
-
-
March 15
-
OpenID version 2.0 specification. http://openid.net/specs/ openidauthentication-2-0.html , March 15 2012
-
(2012)
OpenID Version 2.0 Specification
-
-
-
6
-
-
79952923605
-
Security and privacy enablers for future identity management systems
-
M. Barisch Security and privacy enablers for future identity management systems. Future Network and Mobile Summit, 2010, page 1, 2010.
-
(2010)
Future Network and Mobile Summit, 2010
, pp. 1
-
-
Barisch, M.1
-
8
-
-
34547986595
-
User-centric identity management: New trends in standardization and regulation
-
IEEE, july-aug.
-
P. Bramhall, M. Hansen, K. Rannenberg, and T. Roessler. User-centric identity management: New trends in standardization and regulation. Security Privacy, IEEE, 5(4):84-87, july-aug. 2007.
-
(2007)
Security Privacy
, vol.5
, Issue.4
, pp. 84-87
-
-
Bramhall, P.1
Hansen, M.2
Rannenberg, K.3
Roessler, T.4
-
10
-
-
84868097890
-
-
ID: ACM; ID: ACM - Association for Computing Machinery
-
D. W. Chadwick. Federated Identity Management. 2009. ID: ACM; ID: ACM - Association for Computing Machinery.
-
(2009)
Federated Identity Management
-
-
Chadwick, D.W.1
-
11
-
-
83255193441
-
Identity management directions in future internet
-
IEEE
-
K. Lampropoulos and S. Denazis. Identity management directions in future internet. Communications Magazine, IEEE, vol. 49, no. 12, pp. 74-83, 2011.
-
(2011)
Communications Magazine
, vol.49
, Issue.12
, pp. 74-83
-
-
Lampropoulos, K.1
Denazis, S.2
-
12
-
-
41949139623
-
The seven flaws of identity management: Usability and security challenges
-
IEEE, march-april
-
R. Dhamija and L. Dusseault. The seven flaws of identity management: Usability and security challenges. Security Privacy, IEEE, 6(2):24-29, march-april 2008.
-
(2008)
Security Privacy
, vol.6
, Issue.2
, pp. 24-29
-
-
Dhamija, R.1
Dusseault, L.2
-
13
-
-
47949107361
-
A survey of user-centric identity management technologies
-
T. El Maliki. A survey of user-centric identity management technologies. Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on, page 12, 2007.
-
(2007)
Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on
, pp. 12
-
-
El Maliki, T.1
-
14
-
-
84868134889
-
-
March 15
-
Shibboleth Protocol Specification. http://shibboleth.internet2.edu/docs/ internet2-mace-shibboleth-archprotocols-200509.pdf , March 15 2012
-
(2012)
Shibboleth Protocol Specification
-
-
-
17
-
-
79951627360
-
Mobile data offloading: How much can Wi-Fi deliver?
-
ACM
-
K. Lee, I. Rhee, J. Lee, S. Chong, and Y. Yi. Mobile data offloading: how much can Wi-Fi deliver? In Proceedings of the 6th International Conference, page 26. ACM, 2010.
-
(2010)
Proceedings of the 6th International Conference
, pp. 26
-
-
Lee, K.1
Rhee, I.2
Lee, J.3
Chong, S.4
Yi, Y.5
-
21
-
-
34248337556
-
Identity management
-
IEEE, may-june
-
C. Thompson and D. Thompson. Identity management. Internet Computing, IEEE, 11(3):82-85, may-june 2007.
-
(2007)
Internet Computing
, vol.11
, Issue.3
, pp. 82-85
-
-
Thompson, C.1
Thompson, D.2
-
22
-
-
80053156542
-
Automated security service orchestration for the identity management in web service based systems
-
R. Warschofsky. Automated security service orchestration for the identity management in web service based systems. Web Services (ICWS), 2011 IEEE International Conference on, page 596, 0
-
Web Services (ICWS), 2011 IEEE International Conference on
-
-
Warschofsky, R.1
|