Secure interoperation of identity managements among different circles of trust

[1]  Spyros G. Denazis,et al.  A generic framework for a dynamic identity management and discovery system , 2009, 2009 5th International Conference on Testbeds and Research Infrastructures for the Development of Networks & Communities and Workshops.

[2]  Elisa Bertino,et al.  Trust Negotiation in Identity Management , 2007, IEEE Security & Privacy.

[3]  Marcin,et al.  Overview of Identity Management , 2008 .

[4]  Kenji Takahashi,et al.  Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems , 2009, Computer.

[5]  Jason Crampton,et al.  On permissions, inheritance and role hierarchies , 2003, CCS '03.

[6]  Kyu Il Kim,et al.  Secure collaboration based on RBAC in decentralized multi-domain environments , 2009, 2009 1st IEEE Symposium on Web Society.

[7]  Tomoya Enokido,et al.  A legal information flow (LIF) scheduler based on role-based access control model , 2009, Comput. Stand. Interfaces.

[8]  K. Tracy Identity management systems , 2008, IEEE Potentials.

[9]  Ray A. Perlner,et al.  Electronic Authentication Guideline: Recommendations of the National Institute of Standards and Technology (Special Publication 800-63-1) , 2012 .

[10]  Dale R. Thompson,et al.  Identity Management , 2007, IEEE Internet Computing.

[11]  E.B. Fernandez,et al.  A Pattern Language for Identity Management , 2007, 2007 International Multi-Conference on Computing in the Global Information Technology (ICCGI'07).

[12]  Li Gong,et al.  Computational Issues in Secure Interoperation , 1996, IEEE Trans. Software Eng..

[13]  Marit Hansen,et al.  Privacy and Identity Management , 2008, IEEE Security & Privacy.

[14]  Elisa Bertino,et al.  Secure Collaboration in a Mediator-Free Distributed Environment , 2008, IEEE Transactions on Parallel and Distributed Systems.

[15]  Elisa Bertino,et al.  Access-control language for multidomain environments , 2004, IEEE Internet Computing.

[16]  Valérie Viet Triem Tong,et al.  An efficient distributed PKI for structured P2P networks , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.

[17]  Tat-Keung Chan,et al.  Using the Liberty Alliance Architecture to Secure IP-level Handovers , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[18]  Yann Pollet,et al.  An Ontology-Based Architecture for Federated Identity Management , 2009, 2009 International Conference on Advanced Information Networking and Applications.

[19]  Craig W. Thompson,et al.  Extending a Natural Language Interface with Geospatial Queries , 2007, IEEE Internet Computing.

[20]  Gail-Joon Ahn,et al.  Ensuring information assurance in federated identity management , 2004, IEEE International Conference on Performance, Computing, and Communications, 2004.

[21]  James Backhouse Interoperability of identity and identity management systems , 2006, Datenschutz und Datensicherheit - DuD.

[22]  Audun Jøsang,et al.  A User-centric Federated Single Sign-on System , 2007, 2007 IFIP International Conference on Network and Parallel Computing Workshops (NPC 2007).

[23]  Simon S. Y. Shim,et al.  Federated Identity Management , 2005, Computer.