Waterhouse: enabling secure e-mail with social networking
CHI '09 Extended Abstracts on Human Factors in Computing Systems
Risks of the CardSpace Protocol
ISC '09 Proceedings of the 12th International Conference on Information Security
Design of lock-keeper federated authentication gateway
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
CardSpace-liberty integration for CardSpace users
Proceedings of the 9th Symposium on Identity and Trust on the Internet
Enhancing cardspace authentication using a mobile device
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
User-centric identity management using trusted modules
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
A universal client-based identity management tool
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Towards a Trust Management Enabled Identity Metasystem
International Journal of Organizational and Collective Intelligence
Hi-index | 0.00 |
Windows CardSpace empowers organizations to prevent identity theft and systematically address a broad spectrum of security and privacy challenges. Understanding Windows CardSpaceis the first insider's guide to Windows CardSpace and the broader topic of identity management for technical and business professionals. Drawing on the authors' unparalleled experience earned by working with the CardSpace product team and by implementing state-of-the-art CardSpace-based systems at leading enterprises, it offers unprecedented insight into the realities of identity management: from planning and design through deployment.Part I introduces the fundamental concepts of user-centered identity management, explains the context in which Windows CardSpace operates, and reviews the problems CardSpace aims to solve. Next, the authors walk through CardSpace from a technical standpoint, describing its technologies, elements, artifacts, operations and development practices, and usage scenarios. Finally, they carefully review the design and business considerations associated with architecting solutions based on CardSpace or any other user-centered identity managementsystem. Coverage includes The limitations of current approaches to authentication and identity management Detailed information on advanced Web services The Identity Metasystem, the laws of identity, and the ideal authentication system Windows CardSpace: What it is, how it works, and how developers and managers can use it in their organizations CardSpace technology: user experience, Information Cards, private desktops, and integration with .NET 3.5 and Windows Vista CardSpace implementation: from HTML integration through federation, Web services integration, and beyond Adding personal card support to a website: a detailed, scenario-based explanation Choosing or becoming an identity provider: opportunities, business impacts, operational issues, and pitfalls to avoid Using CardSpace to leverage trust relationships and overcome phishing Whether you're a developer, security specialist, or business decision-maker, this book will answer your most crucial questions about identity management, so you can protect everything that matters: your people, your assets, your partners, and your customers.ForewordPrefacePart Iï戮 ï戮 ï戮 ï戮 Setting the ContextChapter 1ï戮 ï戮 ï戮 ï戮 The Problem ï戮 3Chapter 2ï戮 ï戮 ï戮 ï戮 Hints Toward a Solution ï戮 87Part IIï戮 ï戮 ï戮 ï戮 The TechnologyChapter 3ï戮 ï戮 ï戮 ï戮 Windows CardSpace 169Chapter 4ï戮 ï戮 ï戮 ï戮 CardSpace Implementationï戮 223Chapter 5ï戮 ï戮 ï戮 ï戮 Guidance for a Relying Partyï戮 269Part IIIï戮 ï戮 ï戮 ï戮 Practical ConsiderationsChapter 6ï戮 ï戮 ï戮 ï戮 Identity Consumersï戮 305Chapter 7ï戮 ï戮 ï戮 ï戮 Identity Providersï戮 323Index 343ï戮