GroupLens: an open architecture for collaborative filtering of netnews
CSCW '94 Proceedings of the 1994 ACM conference on Computer supported cooperative work
Software engineering for security: a roadmap
Proceedings of the Conference on The Future of Software Engineering
Item-based collaborative filtering recommendation algorithms
Proceedings of the 10th international conference on World Wide Web
Privacy in browser-based attribute exchange
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Model Driven Security: Unification of Authorization Models for Fine-Grain Access Control
EDOC '03 Proceedings of the 7th International Conference on Enterprise Distributed Object Computing
Virtual monotonic counters and count-limited objects using a TPM without a trusted OS
Proceedings of the first ACM workshop on Scalable trusted computing
A Privacy Oriented Extension of Attribute Exchange in Shibboleth
SAINT-W '07 Proceedings of the 2007 International Symposium on Applications and the Internet Workshops
An Access Control Metamodel for Web Service-Oriented Architecture
ICSEA '07 Proceedings of the International Conference on Software Engineering Advances
Editorial: Model-Driven Development for secure information systems
Information and Software Technology
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Hi-index | 0.00 |
Identity management refers to authentication, sharing of personally identifiable information (PII) and provision of mechanisms protecting the privacy thereof. The most commonly implemented is federated authentication, permitting users to maintain a single set of credentials to access many services. Specifications exist for profile exchange between a service provider (SP) and the identity provider (IdP), but are rarely used. Most frequently, local storage of profile data is utilised due to security and privacy concerns. Key work in this area includes that of the PRIME project, which provides privacy enhancing identity management [1]. Their work utilises local data stores and/or trusted third parties.