Security in mobile communications: challenges and opportunities
ACSW Frontiers '03 Proceedings of the Australasian information security workshop conference on ACSW frontiers 2003 - Volume 21
Signposts in Cyberspace: The Domain Name System And Internet Navigation
Signposts in Cyberspace: The Domain Name System And Internet Navigation
Why Johnny can't encrypt: a usability evaluation of PGP 5.0
SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium - Volume 8
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Layered identity infrastructure model for identity meta systems
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
A user-centric federated single sign-on system
Journal of Network and Computer Applications
Security Usability of Petname Systems
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
Context sensitive adaptive authentication
EuroSSC'07 Proceedings of the 2nd European conference on Smart sensing and context
Preliminary security specification for New Zealand's igovt system
AISC '09 Proceedings of the Seventh Australasian Conference on Information Security - Volume 98
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle
Proceedings of the 6th ACM workshop on Digital identity management
A framework for the lived experience of identity
Identity in the Information Society
A billion keys, but few locks: the crisis of web single sign-on
Proceedings of the 2010 workshop on New security paradigms
Privacy policies for shared content in social network sites
The VLDB Journal — The International Journal on Very Large Data Bases
User-centric identity management using trusted modules
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Security in context: investigating the impact of context on attitudes towards biometric technology
BCS '10 Proceedings of the 24th BCS Interaction Specialist Group Conference
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Nephele: Scalable Access Control for Federated File Services
Journal of Grid Computing
Federated identity to access e-government services: are citizens ready for this?
Proceedings of the 2013 ACM workshop on Digital identity management
Identity management through "profiles": prototyping an online information segregation service
HCI'13 Proceedings of the 15th international conference on Human-Computer Interaction: users and contexts of use - Volume Part III
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Hi-index | 0.00 |
Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to in an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem and makes people unable properly control and protect their digital identities against identity theft. This paper discusses the usability and privacy in online identity management solutions, and proposed a general approach for making users better able to control and manage their digital identities, as well as for creating more secure identity management solutions. More specifically, we propose a user-centric approach based on hardware and software technology on the user-side with the aim of assisting users when accessing online services.