Trade-off Analysis of Identity Management Systems with an Untrusted Identity Provider
暂无分享,去创建一个
[1] Tadayoshi Kohno,et al. Trust (and mistrust) in secure applications , 2001, CACM.
[2] Bashar Nuseibeh,et al. Using Trust Assumptions in Security Requirements Engineering , 2003 .
[3] Ari Juels,et al. A New Two-Server Approach for Authentication with Short Secrets , 2003, USENIX Security Symposium.
[4] Yossi Matias,et al. How to Make Personalized Web Browising Simple, Secure, and Anonymous , 1997, Financial Cryptography.
[5] Lin Liu,et al. Analyzing trust in technology strategies , 2006, PST.
[6] Lin Liu,et al. Modelling Trust for System Design Using the i* Strategic Actors Framework , 2000, Trust in Cyber-societies.
[7] John Mylopoulos,et al. Security and privacy requirements analysis within a social setting , 2003, Proceedings. 11th IEEE International Requirements Engineering Conference, 2003..
[8] Eric S. K. Yu,et al. A Goal Oriented Approach for Modeling and Analyzing Security Trade-Offs , 2007, ER.
[9] Burton S. Kaliski,et al. Server-assisted generation of a strong secret from a password , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).
[10] Dan Boneh,et al. Stronger Password Authentication Using Browser Extensions , 2005, USENIX Security Symposium.
[11] N. Mamode,et al. Trust and mistrust , 1994 .
[12] Audun Jøsang,et al. Trust Requirements in Identity Management , 2005, ACSW.
[13] Lin Liu,et al. Modeling Identity Management Architecture Within a Social Setting , 2006, APWeb.
[14] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[15] John Mylopoulos,et al. Modeling security requirements through ownership, permission and delegation , 2005, 13th IEEE International Conference on Requirements Engineering (RE'05).
[16] Lin Liu,et al. Intentional Modeling to Support Identity Management , 2004, ER.