Donkers et al. - Google Patents
User Management in a Context-Aware EnvironmentDonkers et al.
- Document ID
- 13723602149957974887
- Author
- Donkers M
- Pires L
- van Sinderen M
External Links
- 238000011160 research 0 abstract description 35
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/30—Network-specific arrangements or communication protocols supporting networked applications involving profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42365—Presence services providing information on the willingness to communicate or the ability to communicate in terms of media capability or network connectivity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/32—Network-specific arrangements or communication protocols supporting networked applications for scheduling or organising the servicing of application requests, e.g. requests for application data transmissions involving the analysis and optimisation of the required network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42025—Calling or Called party identification service
- H04M3/42085—Called party identification service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/487—Arrangements for providing information services, e.g. recorded voice services, time announcement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/28—Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Hulsebosch et al. | Context sensitive access control | |
US7610390B2 (en) | Distributed network identity | |
Sánchez et al. | Enhancing privacy and dynamic federation in IdM for consumer cloud computing | |
US7290278B2 (en) | Identity based service system | |
US8819784B2 (en) | Method for managing access to protected resources and delegating authority in a computer network | |
US6668322B1 (en) | Access management system and method employing secure credentials | |
US7913291B2 (en) | Means and method for control of personal data | |
EP2186254A2 (en) | Transferable restricted security tokens | |
CN101331731A (en) | Method, apparatus and program products for custom authentication of a principal in a federation by an identity provider | |
WO2001011845A2 (en) | Security architecture with environment sensitive credentials | |
Brar et al. | Privacy and security in ubiquitous personalized applications | |
Monir | A Lightweight Attribute-Based Access Control System for IoT. | |
Chadwick et al. | A conceptual model for attribute aggregation | |
Donkers et al. | User Management in a Context-Aware Environment | |
Chen | A scenario for identity management in Daidalos | |
Teerakanok et al. | A privacy-preserving framework for location-based service: a review of structural design and analysis | |
Sabbari et al. | Improving attribute based access control model for web services | |
Seigneur et al. | Identity management | |
El Maliki et al. | User-centric mobile identity management services | |
Patrikakis et al. | Establishing trust through anonymous and private information exchange over personal networks | |
Galvão et al. | OIDC-PRINCE: OpenID Connect with Privacy-Enhanced Consents | |
Papanchev | An Interoperable Access Control System Based on Self-sovereign Identities | |
Lábaj et al. | Policy-based access control using biometric authetication mechanisms | |
Pandey et al. | Online Identity Management techniques: identification and analysis of flaws and standard methods | |
Hassan | Conceptual Design of Identity Management in a profile-based access control |