ACM Transactions on Information and System Security (TISSEC)
Protecting sensitive attributes in automated trust negotiation
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Single Sign-On Using Cookies for Web Applications
WETICE '99 Proceedings of the 8th Workshop on Enabling Technologies on Infrastructure for Collaborative Enterprises
A Unified Scheme for Resource Protection in Automated Trust Negotiation
SP '03 Proceedings of the 2003 IEEE Symposium on Security and Privacy
Trust-X: A Peer-to-Peer Framework for Trust Establishment
IEEE Transactions on Knowledge and Data Engineering
Content-triggered trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Trust-Serv: a lightweight trust negotiation service
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Protecting privacy during on-line trust negotiation
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
A three-layered model to implement data privacy policies
Computer Standards & Interfaces
Privilege federation between different user profiles for service federation
Proceedings of the 4th ACM workshop on Digital identity management
A Novel Automated Trust Negotiation Framework for Securing Grids
Computer Supported Cooperative Work in Design IV
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Inferring privacy policies for social networking services
Proceedings of the 2nd ACM workshop on Security and artificial intelligence
Federation proxy for cross domain identity federation
Proceedings of the 5th ACM workshop on Digital identity management
Obligations for privacy and confidentiality in distributed transactions
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
Towards a dynamic federation framework based on SAML and automated trust negotiation
WISM'10 Proceedings of the 2010 international conference on Web information systems and mining
Modeling and negotiating service quality
Service research challenges and solutions for the future internet
Secure interoperation of identity managements among different circles of trust
Computer Standards & Interfaces
Challenges in secure sensor-cloud computing
SDM'11 Proceedings of the 8th VLDB international conference on Secure data management
A Game Theoretic Approach to Optimize Identity Exposure in Pervasive Computing Environments
International Journal of Information Security and Privacy
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Most organizations require the verification of personal information before providing services, and the privacy of such information is of growing concern. The authors show how federated identity management systems can better protect users' information when integrated with trust negotiation.