Blended Identity: Pervasive IdM for Continuous Authentication
暂无分享,去创建一个
Andrés Marín López | Florina Almenárez | Daniel Díaz Sánchez | Patricia Arias Cabarcos | Rubén Trapero | F. Almenárez | R. Trapero
[1] Andrea Baker,et al. Mick or Keith: blended identity of online rock fans , 2009 .
[2] Chuan Qin,et al. Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.
[3] K. Cameron. The Laws of Identity , 2005 .
[4] Rachna Dhamija,et al. The Seven Flaws of Identity Management: Usability and Security Challenges , 2008, IEEE Security & Privacy.
[5] Frank Stajano. Pico: No More Passwords! , 2011, Security Protocols Workshop.
[6] W ManchalaDaniel. E-Commerce Trust Metrics and Models , 2000 .
[7] Andrés Marín López,et al. fedTV: personal networks federation for IdM in mobile DTV , 2011, IEEE Transactions on Consumer Electronics.
[8] Eve Maler,et al. The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.
[9] S. Erfani,et al. Journal of network and systems management , 2005, Journal of Network and Systems Management.
[10] Andrés Marín López,et al. Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.
[11] Francisco J. Ballesteros,et al. SHAD: A Human-Centered Security Architecture for the Plan B Operating System , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).
[12] David A. Cooper,et al. Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations , 2005 .
[13] David W. Chadwick,et al. Federated Identity Management , 2009, FOSAD.
[14] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[15] Andrés Marín López,et al. A Metric-Based Approach to Assess Risk for “On Cloud” Federated Identity Management , 2012, Journal of Network and Systems Management.
[16] W. Marsden. I and J , 2012 .
[17] Daniel W. Manchala. E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..
[18] James H. Aylor,et al. Computer for the 21st Century , 1999, Computer.
[19] Ralph L. Keeney,et al. Decisions with multiple objectives: preferences and value tradeoffs , 1976 .
[20] R. L. Keeney,et al. Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.