NUK - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources NUK. For full access, REGISTER.

3 4 5 6 7
hits: 2,831
41.
Full text
42.
  • On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure
    Berbecaru, Diana; Lioy, Antonio 2016 IEEE Symposium on Computers and Communication (ISCC), 06/2016
    Conference Proceeding

    This paper describes the design and implementation of an Attribute Provider (AP), compatible with the protocol defined in the STORK 2.0 electronic identity European infrastructure that provides ...
Full text
43.
  • TECHNOLOGY OF FEDERATED IDE... TECHNOLOGY OF FEDERATED IDENTITY AND SECURE LOGGINGS IN CLOUD COMPUTING
    Takashi Shitamichi; Ryoichi Sasaki International Journal of Electronic Commerce Studies, 201406, Volume: 5, Issue: 1
    Journal Article
    Peer reviewed

    Federated services are becoming widely implemented at many sites in multiple domain networks for cloud computing across many industry segments. New technology is required not only for federated ...
Full text
44.
  • Claims-based enterprise-wid... Claims-based enterprise-wide access control
    Chandersekaran, Coimbatore; Simpson, William R World Congress on Engineering 2012. July 4-6, 2012. London, UK, 07/2012
    Journal Article

    Access control is a primary consideration when standing up a high-assurance, internet-scale, and web-service based enterprise system for information sharing,. A generalized standards-based solution ...
Full text
45.
  • Reliability and scalability improvements to identity federations by managing SAML metadata with distributed ledger technology
    Grabatin, Michael; Hommel, Wolfgang NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium, 2018-Apr.
    Conference Proceeding

    In identity federations, users assigned to identity providers (IDPs) can access applications operated by service providers (SPs) without SP-specific credentials for authentication and authorization. ...
Full text
46.
  • Security and Cloud Computin... Security and Cloud Computing: InterCloud Identity Management Infrastructure
    Celesti, A; Tusa, F; Villari, M ... 2010 19th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2010-June
    Conference Proceeding

    Cloud Computing is becoming one of the most important topics in the IT world. Several challenges are being raised from the adoption of this computational paradigm including security, privacy, and ...
Full text
47.
  • Avoiding Unintended Flows o... Avoiding Unintended Flows of Personally Identifiable Information : Enterprise Identity Management and Online Social Networks
    Labitzke, Sebastian 2013
    eBook
    Open access

    This work addresses potentially occurring unintended flows of personally identifiable information (PII) within two fields of research, i.e., enterprise identity management and online social networks. ...
Full text
48.
  • A Survey on Single Sign-On ... A Survey on Single Sign-On Techniques
    Radha, V.; Reddy, D. Hitha Procedia technology, 2012, 2012-00-00, Volume: 4
    Journal Article
    Peer reviewed
    Open access

    Single sign-on (SSO) is a mechanism that uses a single action of authentication to permit an authorized user to access all related, but independent software systems or applications without being ...
Full text

PDF
49.
  • A Survey of Payment Approaches for Identity Federations in Focus of the SAML Technology
    Lutz, David J.; Stiller, Burkhard IEEE Communications surveys and tutorials, 01/2013, Volume: 15, Issue: 4
    Journal Article
    Peer reviewed

    Identity Federations are increasingly being used to establish convenient and secure attribute-based authentication and authorization systems. Whilst this process began mainly in the academic sector, ...
Full text
50.
  • A Metric-Based Approach to ... A Metric-Based Approach to Assess Risk for “On Cloud” Federated Identity Management
    Arias-Cabarcos, Patricia; Almenárez-Mendoza, Florina; Marín-López, Andrés ... Journal of network and systems management, 12/2012, Volume: 20, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    The cloud computing paradigm is set to become the next explosive revolution on the Internet, but its adoption is still hindered by security problems. One of the fundamental issues is the need for ...
Full text

PDF
3 4 5 6 7
hits: 2,831

Load filters