Secure roaming with identity metasystems
Proceedings of the 7th symposium on Identity and trust on the Internet
Kalpana - enabling client-side web personalization
Proceedings of the nineteenth ACM conference on Hypertext and hypermedia
Handling flash crowds from your garage
ATC'08 USENIX 2008 Annual Technical Conference on Annual Technical Conference
PrintMonkey: giving users a grip on printing the web
Proceedings of the eighth ACM symposium on Document engineering
Requirements for Rich Internet Application Design Methodologies
WISE '08 Proceedings of the 9th international conference on Web Information Systems Engineering
Identity-based long running negotiations
Proceedings of the 4th ACM workshop on Digital identity management
Public vs. private: comparing public social network information with email
Proceedings of the 2008 ACM conference on Computer supported cooperative work
Towards organizational agent-oriented operating systems
Proceedings of the 2009 ACM symposium on Applied Computing
Proceedings of the 5th International Symposium on Wikis and Open Collaboration
Improving the safety and practicality of authorization technology using LOAF
Proceedings of the 5th ACM workshop on Digital identity management
Fine-Grained Recommendation Systems for Service Attribute Exchange
ICSOC-ServiceWave '09 Proceedings of the 7th International Joint Conference on Service-Oriented Computing
Four lessons in versatility or how query languages adapt to the web
Semantic techniques for the web
User-centric handling of identity agent compromise
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A cross-platform P2P based blog system
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A concept of interoperable authentication framework for dynamic relationship in identity management
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Extended identity for social networks
BlogTalk'08/09 Proceedings of the 2008/2009 international conference on Social software: recent trends and developments in social software
The password game: negative externalities from weak password practices
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Using one-time passwords to prevent password phishing attacks
Journal of Network and Computer Applications
xDAuth: a scalable and lightweight framework for cross domain access control and delegation
Proceedings of the 16th ACM symposium on Access control models and technologies
User-centric identity management using trusted modules
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Enhancing OpenID through a reputation framework
ATC'11 Proceedings of the 8th international conference on Autonomic and trusted computing
Challenges in secure sensor-cloud computing
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
An approach and tool support for assisting users to fill-in web forms with personal information
Proceedings of the 29th ACM international conference on Design of communication
OAuth+UAO: a distributed identification mechanism for triplestores
ICCCI'11 Proceedings of the Third international conference on Computational collective intelligence: technologies and applications - Volume Part I
The power of recognition: secure single sign-on using TLS channel bindings
Proceedings of the 7th ACM workshop on Digital identity management
Client-based authentication technology: user-centric authentication using secure containers
Proceedings of the 7th ACM workshop on Digital identity management
SECaaS: security as a service for cloud-based applications
Proceedings of the Second Kuwait Conference on e-Services and e-Systems
OKBook: peer-to-peer community formation
ESWC'10 Proceedings of the 7th international conference on The Semantic Web: research and Applications - Volume Part II
Using identities to achieve enhanced privacy in future content delivery networks
Computers and Electrical Engineering
Web linking-based protocols for guiding RESTful m2m interaction
ICWE'11 Proceedings of the 11th international conference on Current Trends in Web Engineering
Musubi: disintermediated interactive social feeds for mobile devices
Proceedings of the 21st international conference on World Wide Web
Access control enforcement delegation for information-centric networking architectures
Proceedings of the second edition of the ICN workshop on Information-centric networking
Social networks profile mapping using games
WebApps'12 Proceedings of the 3rd USENIX conference on Web Application Development
Supporting users tasks with personal information management and web forms augmentation
ICWE'12 Proceedings of the 12th international conference on Web Engineering
Access control enforcement delegation for information-centric networking architectures
ACM SIGCOMM Computer Communication Review - Special october issue SIGCOMM '12
The CloudGrid approach: Security analysis and performance evaluation
Future Generation Computer Systems
Strong authentication with mobile phone
ISC'12 Proceedings of the 15th international conference on Information Security
Simplified authentication and authorization for RESTful services in trusted environments
ESOCC'12 Proceedings of the First European conference on Service-Oriented and Cloud Computing
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Distributed affordance: an open-world assumption for hypermedia
Proceedings of the 22nd international conference on World Wide Web companion
A review of GENI authentication and access control mechanisms
International Journal of Security and Networks
SAuth: protecting user accounts from password database leaks
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Do I know you?: efficient and privacy-preserving common friend-finder protocols and applications
Proceedings of the 29th Annual Computer Security Applications Conference
Being example: a different kind of leadership, looking for exemplary behaviors
OCSC'13 Proceedings of the 5th international conference on Online Communities and Social Computing
PhishSafe: leveraging modern JavaScript API's for transparent and robust protection
Proceedings of the 4th ACM conference on Data and application security and privacy
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
High-performance capabilities for 1-hop containment of network attacks
IEEE/ACM Transactions on Networking (TON)
Hi-index | 0.00 |
With the advancement in user-centric and URI-based identity systems over the past two years, it has become clear that a single specification will not be the solution to all problems. Rather, like the other layers of the Internet, developing small, interoperable specifications that are independently implementable and useful will ultimately lead to market adoption of these technologies. This is the intent of the OpenID framework. OpenID Authentication 1.0 began as a lightweight HTTP-based URL authentication protocol. OpenID Authentication 2.0 it is now turning into an open community-driven platform that allows and encourages innovation. It supports both URLs and XRIs as user identifiers, uses Yadis XRDS documents for identity service discovery, adds stronger security, and supports both public and private identifiers. With continuing convergence under this broad umbrella, the OpenID framework is emerging as a viable solution for Internet-scale user-centric identity infrastructure.