Accountable certificate management using undeniable attestations
Proceedings of the 7th ACM conference on Computer and communications security
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
A uniform framework for regulating service access and information release on the web
Journal of Computer Security
IEEE Internet Computing
Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Towards securing XML Web services
Proceedings of the 2002 ACM workshop on XML security
Binding identities and attributes using digitally signed certificates
ACSAC '00 Proceedings of the 16th Annual Computer Security Applications Conference
Managing and Sharing Servents' Reputations in P2P Systems
IEEE Transactions on Knowledge and Data Engineering
Web Privacy with P3p
Policy migration for sensitive credentials in trust negotiation
Proceedings of the 2003 ACM workshop on Privacy in the electronic society
The claim tool kit for ad hoc recognition of peer entities
Science of Computer Programming - Special issue on principles and practice of programming in java (PPPJ 2003)
A Contextual Framework for Combating Identity Theft
IEEE Security and Privacy
Detection and surveillance technologies: privacy-related requirements and protection schemes
International Journal of Electronic Security and Digital Forensics
Interoperability of E-Government Information Systems: Issues of Identification and Data Sharing
Journal of Management Information Systems
Identity Federation for VoIP systems
Journal of Computer Security - Digital Identity Management (DIM 2007)
Towards a formal framework for distributed identity management
APWeb'05 Proceedings of the 7th Asia-Pacific web conference on Web Technologies Research and Development
A new user-centric identity management infrastructure for federated systems
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
Trust model architecture: defining prejudice by learning
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Hi-index | 0.00 |
Management of multiple and dependable identities is a crucial problem for the development of the next generation of distributed applications. This article illustrates the concept of digital identity management, the motivations for the support of multiplicity and dependability, and provides a discussion on different open issues that need to be addressed toward the support of multiple and dependable identities.