Secure interoperation of identity managements among different circles of trust
暂无分享,去创建一个
Zhen Ji | Jianyong Chen | Guihua Wu | Jianyong Chen | Zhen Ji | Guihua Wu
[1] Spyros G. Denazis,et al. A generic framework for a dynamic identity management and discovery system , 2009, 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops.
[2] Elisa Bertino,et al. Trust Negotiation in Identity Management , 2007, IEEE Security & Privacy.
[3] Marcin,et al. Overview of Identity Management , 2008 .
[4] Kenji Takahashi,et al. Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems , 2009, Computer.
[5] Jason Crampton,et al. On permissions, inheritance and role hierarchies , 2003, CCS '03.
[6] Kyu Il Kim,et al. Secure collaboration based on RBAC in decentralized multi-domain environments , 2009, 2009 1st IEEE Symposium on Web Society.
[7] Tomoya Enokido,et al. A legal information flow (LIF) scheduler based on role-based access control model , 2009, Comput. Stand. Interfaces.
[8] K. Tracy. Identity management systems , 2008, IEEE Potentials.
[9] Ray A. Perlner,et al. Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (Special Publication 800-63-1) , 2012 .
[10] Dale R. Thompson,et al. Identity Management , 2007, IEEE Internet Computing.
[11] E.B. Fernandez,et al. A Pattern Language for Identity Management , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).
[12] Li Gong,et al. Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..
[13] Marit Hansen,et al. Privacy and Identity Management , 2008, IEEE Security & Privacy.
[14] Elisa Bertino,et al. Secure Collaboration in a Mediator-Free Distributed Environment , 2008, IEEE Transactions on Parallel and Distributed Systems.
[15] Elisa Bertino,et al. Access-control language for multidomain environments , 2004, IEEE Internet Computing.
[16] Valérie Viet Triem Tong,et al. An efficient distributed PKI for structured P2P networks , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[17] Tat-Keung Chan,et al. Using the Liberty Alliance Architecture to Secure IP-level Handovers , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[18] Yann Pollet,et al. An Ontology-Based Architecture for Federated Identity Management , 2009, 2009 International Conference on Advanced Information Networking and Applications.
[19] Craig W. Thompson,et al. Extending a Natural Language Interface with Geospatial Queries , 2007, IEEE Internet Computing.
[20] Gail-Joon Ahn,et al. Ensuring information assurance in federated identity management , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.
[21] James Backhouse. Interoperability of identity and identity management systems , 2006, Datenschutz und Datensicherheit - DuD.
[22] Audun Jøsang,et al. A User-centric Federated Single Sign-on System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).
[23] Simon S. Y. Shim,et al. Federated Identity Management , 2005, Computer.