Authentication in distributed systems: theory and practice
ACM Transactions on Computer Systems (TOCS)
World Wide Web Journal - Special issue: Web security: a matter of trust
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Modelling a Public-Key Infrastructure
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Proceedings of the 11th ACM conference on Computer and communications security
Simplification and analysis of transitive trust networks
Web Intelligence and Agent Systems
Dynamics in delegation and revocation schemes: a logical approach
DBSec'11 Proceedings of the 25th annual IFIP WG 11.3 conference on Data and applications security and privacy
Hi-index | 0.01 |
Horizontal integration of access technologies to networks and services should be accompanied by some kind of convergence of authentication technologies. The missing link for the federation of user identities across the technological boundaries separating authentication methods can be provided by trusted computing platforms. The concept of establishing transitive trust by trusted computing enables the desired cross-domain authentication functionality. The focus of target application scenarios lies in the realm of mobile networks and devices.