Cameron et al., 2008 - Google Patents
A user-centric identity metasystemCameron et al., 2008
View PDF- Document ID
- 12961436666203714984
- Author
- Cameron K
- et al.
- Publication year
- Publication venue
- Microsoft Corp
External Links
Snippet
This paper proposes a framework for protecting privacy and avoiding the unnecessary propagation of identity information while facilitating exchange of specific information needed by Internet systems to personalize and control access to services. It also sets out factors to …
- 230000002633 protecting 0 abstract description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fernandez-Buglioni | Security patterns in practice: designing secure architectures using software patterns | |
US7392546B2 (en) | System and method for server security and entitlement processing | |
CN100571129C (en) | Method and system supported by trust infrastructure for federated user lifecycle management | |
Ardagna et al. | Exploiting cryptography for privacy-enhanced access control: A result of the PRIME project | |
CN109446259A (en) | Data processing method and device, processor and storage medium | |
South et al. | Authenticated delegation and authorized ai agents | |
Kyriakidou et al. | Decentralized identity with applications to security and privacy for the internet of things | |
Adjei et al. | Keeping identity private | |
Cameron et al. | Appendix d. proposal for a common identity framework: A user-centric identity metasystem | |
Leenes et al. | PRIME white paper | |
Cameron | A user-centric identity metasystem | |
Feulner et al. | Self-Sovereign Identity for Digital KYC | |
Alpár | Attribute-based identity management:[bridging the cryptographic design of ABCs with the real world] | |
Fumy et al. | Handbook of EID Security: Concepts, Practical Experiences, Technologies | |
Pons | Benchmark of Decentralised Identifier and Identity Terms for Harmonising Blockchain and Distributed Ledger Technology and Identification Standards. 15 | |
Leenes et al. | PRIME white paper (V3) | |
Caumanns et al. | IHE IT-infrastructure white paper | |
Tahajod et al. | Trust management for semantic web | |
Lleka et al. | Using blockchain technology for ID management: a case study for Albania | |
Gladney | Safe deals between strangers | |
Lohar et al. | A Self-Sovereign Identity Framework for Context-Aware De-Centralized Identifier Creation and Credential Verification | |
van Ewijk et al. | The Future of Personally Identifying Information Ownership | |
Alkhalifah et al. | The role of Identity Management Systems in enhancing protection of user privacy | |
Shi et al. | The Right to Personal Data Portability: Practices and Prospects | |
Sommer | Privacy-enhanced Identity Management–From Cryptography to Practice |