Proceedings of the 8th Symposium on Identity and Trust on the Internet
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle
Proceedings of the 6th ACM workshop on Digital identity management
Towards privacy-enhancing identity management in mashup-providing platforms
DBSec'10 Proceedings of the 24th annual IFIP WG 11.3 working conference on Data and applications security and privacy
Towards inclusive identity management
Identity in the Information Society
A billion keys, but few locks: the crisis of web single sign-on
Proceedings of the 2010 workshop on New security paradigms
OpenID-enabled browser: towards usable and secure web single sign-on
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Privacy-enhancing identity management in business
Digital privacy
A comparative usability evaluation of traditional password managers
ICISC'10 Proceedings of the 13th international conference on Information security and cryptology
What makes users refuse web single sign-on?: an empirical investigation of OpenID
Proceedings of the Seventh Symposium on Usable Privacy and Security
NAPTune: fine tuning graphical authentication
Proceedings of the 3rd International Conference on Human Computer Interaction
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
A client-centric ASM-based approach to identity management in cloud computing
ER'12 Proceedings of the 2012 international conference on Advances in Conceptual Modeling
Taking data exposure into account: how does it affect the choice of sign-in accounts?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Federated identity to access e-government services: are citizens ready for this?
Proceedings of the 2013 ACM workshop on Digital identity management
Identity management through "profiles": prototyping an online information segregation service
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Trustworthy and inclusive identity management for applications in social media
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Investigating Users’ Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
ACM Transactions on Internet Technology (TOIT)
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
Identity management systems' scale and complexity, combined with the privacy and security requirements demanded of them, create steep challenges for usability. In this article, the authors posit seven flaws or design challenges that must be met for the general public to accept and use identity management systems.