Search - IFIP - Lecture Notes in Computer Science Access content directly

Filter your results

11 results
Keywords : identity management
Image document

Adaptive User-Centered Security

Sven Wohlgemuth
International Cross-Domain Conference and Workshop on Availability, Reliability, and Security (CD-ARES), Sep 2014, Fribourg, Switzerland. pp.94-109, ⟨10.1007/978-3-319-10975-6_7⟩
Conference papers hal-01403988v1
Image document

The Mediating Role of Social Competition Identity Management Strategy in the Predictive Relationship between Susceptibility to Social Influence, Internet Privacy Concern, and Online Political Efficacy

Juneman Abraham , Murty Magda Pane
2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.492-499, ⟨10.1007/978-3-642-55032-4_50⟩
Conference papers hal-01397263v1
Image document

Improvements of pan-European IDM Architecture to Enable Identity Delegation Based on X.509 Proxy Certificates and SAML

Sergio Sánchez García , Ana Gómez Oliva
4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices (WISTP), Apr 2010, Passau, Germany. pp.183-198, ⟨10.1007/978-3-642-12368-9_13⟩
Conference papers hal-01056087v1
Image document

A Threat to Friendship Privacy in Facebook

Francesco Buccafurri , Gianluca Lax , Serena Nicolazzo , Antonino Nocera
International Conference on Availability, Reliability, and Security (CD-ARES), Aug 2016, Salzburg, Austria. pp.96-105, ⟨10.1007/978-3-319-45507-5_7⟩
Conference papers hal-01635021v1
Image document

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption

Bernd Zwattendorfer , Daniel Slamanig , Klaus Stranacher , Felix Hörandner
15th IFIP International Conference on Communications and Multimedia Security (CMS), Sep 2014, Aveiro, Portugal. pp.92-103, ⟨10.1007/978-3-662-44885-4_8⟩
Conference papers hal-01404190v1
Image document

Enabling the Autonomic Management of Federated Identity Providers

Christopher Bailey , David W. Chadwick , Rogério De Lemos , Kristy S. Siu
7th International Conference on Autonomous Infrastructure (AIMS), Jun 2013, Barcelona, Spain. pp.100-111, ⟨10.1007/978-3-642-38998-6_14⟩
Conference papers hal-01489959v1
Image document

Adding Measures to Task Models for Usability Inspection of the Cloud Access Control Services

Bilal Naqvi , Ahmed Seffah , Christina Braz
7th International Conference on Human-Centred Software Engineering (HCSE), Sep 2018, Sophia Antipolis, France. pp.133-145, ⟨10.1007/978-3-030-05909-5_8⟩
Conference papers hal-02270718v1
Image document

Cross-Border Legal Identity Management

Bernd Zwattendorfer , Arne Tauber , Klaus Stranacher , Peter Reichstädter
11th International Conference on Electronic Government (EGOV), Sep 2012, Kristiansand, Norway. pp.149-161, ⟨10.1007/978-3-642-33489-4_13⟩
Conference papers hal-01543589v1
Image document

Contributing to Current Challenges in Identity and Access Management with Visual Analytics

Alexander Puchta , Fabian Böhm , Günther Pernul
33th IFIP Annual Conference on Data and Applications Security and Privacy (DBSec), Jul 2019, Charleston, SC, United States. pp.221-239, ⟨10.1007/978-3-030-22479-0_12⟩
Conference papers hal-02384584v1
Image document

A Generic Lightweight and Scalable Access Control Framework for IoT Gateways

Juan D. Parra Rodriguez
12th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2018, Brussels, Belgium. pp.207-222, ⟨10.1007/978-3-030-20074-9_15⟩
Conference papers hal-02294606v1
Image document

Privacy Respecting Targeted Advertising for Social Networks

Christian Kahl , Stephen Crane , Markus Tschersich , Kai Rannenberg
5th Workshop on Information Security Theory and Practices (WISTP), Jun 2011, Heraklion, Crete, Greece. pp.361-370, ⟨10.1007/978-3-642-21040-2_26⟩
Conference papers hal-01573299v1