Damiani et al., 2003 - Google Patents
Managing multiple and dependable identitiesDamiani et al., 2003
View PDF- Document ID
- 6490957256247959461
- Author
- Damiani E
- Di Vimercati S
- Samarati P
- Publication year
- Publication venue
- IEEE Internet Computing
External Links
Snippet
Digital management of multiple robust identities is a crucial issue in developing the next generation of distributed applications. Our daily activities increasingly rely on remote resources and services-specifically, on interactions between different, remotely located …
- 230000000694 effects 0 abstract description 13
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Damiani et al. | Managing multiple and dependable identities | |
AU2021206913B2 (en) | Systems and methods for distributed data sharing with asynchronous third-party attestation | |
Bertino et al. | Identity management: Concepts, technologies, and systems | |
Lopez et al. | Authentication and authorization infrastructures (AAIs): a comparative survey | |
Bai et al. | Decentralized and self-sovereign identity in the era of blockchain: A survey | |
CN100571129C (en) | Method and system supported by trust infrastructure for federated user lifecycle management | |
Laborde et al. | A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework | |
Basney et al. | Negotiating trust on the grid | |
US20030163686A1 (en) | System and method for ad hoc management of credentials, trust relationships and trust history in computing environments | |
Bhatti et al. | An integrated approach to federated identity and privilege management in open systems | |
Ribeiro et al. | STORK: a real, heterogeneous, large-scale eID management system | |
Li et al. | Access control for the services oriented architecture | |
Lehti et al. | Certifying trust | |
Kearney et al. | An overview of Web Services security | |
Patil et al. | Trust management for e-transactions | |
Mont et al. | Identity management: a key e-business enabler | |
Santin et al. | Extending the SDSI/SPKI model through federation webs | |
Santin et al. | Federation web: A scheme to compound authorization chains on large-scale distributed systems | |
Linden | Organisational and cross-organisational identity management. | |
Park | Secure attribute services on the web | |
Winnard et al. | Managing Digital Certificates Across the Enterprise | |
Perrin | Public key distribution through" cryptoIDs" | |
Hussain et al. | Persona-based identity management: A novel approach to privacy protection | |
Karabulut | Secure mediation between strangers in cyberspace | |
Weaver et al. | Using web service enhancements to establish trust relationships with privacy protection (extended and invited from icws 2006 with id 47) |