[go: up one dir, main page]

Damiani et al., 2003 - Google Patents

Managing multiple and dependable identities

Damiani et al., 2003

View PDF
Document ID
6490957256247959461
Author
Damiani E
Di Vimercati S
Samarati P
Publication year
Publication venue
IEEE Internet Computing

External Links

Snippet

Digital management of multiple robust identities is a crucial issue in developing the next generation of distributed applications. Our daily activities increasingly rely on remote resources and services-specifically, on interactions between different, remotely located …
Continue reading at vs.inf.ethz.ch (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity

Similar Documents

Publication Publication Date Title
Damiani et al. Managing multiple and dependable identities
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
Bertino et al. Identity management: Concepts, technologies, and systems
Lopez et al. Authentication and authorization infrastructures (AAIs): a comparative survey
Bai et al. Decentralized and self-sovereign identity in the era of blockchain: A survey
CN100571129C (en) Method and system supported by trust infrastructure for federated user lifecycle management
Laborde et al. A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework
Basney et al. Negotiating trust on the grid
US20030163686A1 (en) System and method for ad hoc management of credentials, trust relationships and trust history in computing environments
Bhatti et al. An integrated approach to federated identity and privilege management in open systems
Ribeiro et al. STORK: a real, heterogeneous, large-scale eID management system
Li et al. Access control for the services oriented architecture
Lehti et al. Certifying trust
Kearney et al. An overview of Web Services security
Patil et al. Trust management for e-transactions
Mont et al. Identity management: a key e-business enabler
Santin et al. Extending the SDSI/SPKI model through federation webs
Santin et al. Federation web: A scheme to compound authorization chains on large-scale distributed systems
Linden Organisational and cross-organisational identity management.
Park Secure attribute services on the web
Winnard et al. Managing Digital Certificates Across the Enterprise
Perrin Public key distribution through" cryptoIDs"
Hussain et al. Persona-based identity management: A novel approach to privacy protection
Karabulut Secure mediation between strangers in cyberspace
Weaver et al. Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47)