Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Gestion d'identité")

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 42

  • Page / 2
Export

Selection :

  • and

Federated Identity Management: We Built It; Why Won't They Come? : Technology TransferJENSEN, Jostein; GILJE JAATUN, Martin.IEEE security & privacy. 2013, Vol 11, Num 2, pp 34-41, issn 1540-7993, 8 p.Article

Efficient Consistency Achievement of Federated Identity and Access Management Based on a Novel Self-Adaptable ApproachCHA, Shi-Cho; CHANG, Hsiang-Meng.IEICE transactions on information and systems. 2012, Vol 95, Num 2, pp 577-587, issn 0916-8532, 11 p.Article

Authentication Trust Metric and Assessment for Federated Identity Management Systems : Trust, Security and Privacy in Computing and Communication SystemsGOMI, Hidehito.IEICE transactions on information and systems. 2012, Vol 95, Num 1, pp 29-37, issn 0916-8532, 9 p.Article

Current and future privacy enhancing technologies for the internet : Network and information systems securityDESWARTE, Yves; AGUILAR MELCHOR, Carlos.Annales des télécommunications. 2006, Vol 61, Num 3-4, pp 399-417, issn 0003-4347, 19 p.Article

Identity management based on P3PBERTHOLD, Oliver; KÖHNTOPP, Marit.Lecture notes in computer science. 2001, pp 141-160, issn 0302-9743, isbn 3-540-41724-9Conference Paper

Performance analysis of a cross-layer SSO mechanism for a roaming infrastructureSDNCHEZ, Manuel; LOPEZ, Gabriel; CANOVAS, Oscar et al.Journal of network and computer applications. 2009, Vol 32, Num 4, pp 808-823, issn 1084-8045, 16 p.Article

A user-centric federated single sign-on systemSURIADI, Suriadi; FOO, Ernest; JØSANG, Audun et al.Journal of network and computer applications. 2009, Vol 32, Num 2, pp 388-401, issn 1084-8045, 14 p.Conference Paper

Using one-time passwords to prevent password phishing attacksHUANG, Chun-Ying; MA, Shang-Pin; CHEN, Kuan-Ta et al.Journal of network and computer applications. 2011, Vol 34, Num 4, pp 1292-1301, issn 1084-8045, 10 p.Article

Privacy-preserving identity federations in the cloud: a proof of conceptDOS SANTOS, Daniel Ricardo; NASCIMENTO, Tiago Jaime; WESTPHALL, Carla Merkle et al.International journal of security and networks (Print). 2014, Vol 9, Num 1, pp 1-11, issn 1747-8405, 11 p.Article

Identity crisis: Global challenges of identity protection in a networked worldKNIGHT, Alison; SAXBY, Steve.Computer law and security report. 2014, Vol 30, Num 6, pp 617-632, issn 0267-3649, 16 p.Article

Interworked WiMAX-3G Cellular Data Networks: An Architecture for Mobility Management and Performance EvaluationMUNASINGHE, Kumudu S; JAMALIPOUR, Abbas.IEEE transactions on wireless communications. 2009, Vol 8, Num 4, pp 1847-1853, issn 1536-1276, 7 p.Article

Consolidated Identity Management System for secure mobile cloud computingKHALIL, Issa; KHREISHAH, Abdallah; AZEEM, Muhammad et al.Computer networks (1999). 2014, Vol 65, pp 99-110, issn 1389-1286, 12 p.Article

Data minimisation in communication protocols: a formal analysis framework and application to identity managementVEENINGEN, Meilof; DE WEGER, Benne; ZANNONE, Nicola et al.International journal of information security (Print). 2014, Vol 13, Num 6, pp 529-569, issn 1615-5262, 41 p.Article

Identity management and trusted interaction in Internet and mobile computingJØSANG, Audun.IET information security (Print). 2014, Vol 8, Num 2, pp 67-79, issn 1751-8709, 13 p.Article

Identity matching and information acquisition: Estimation of optimal threshold parametersALIREZAZADEH, Pantea; BOYLU, Fidan; GARFINKEL, Robert et al.Decision support systems. 2014, Vol 57, pp 160-171, issn 0167-9236, 12 p.Article

OAuth Web Authorization ProtocolLEIBA, Barry.IEEE internet computing. 2012, Vol 16, Num 1, pp 74-77, issn 1089-7801, 4 p.Article

A QoS-aware VoD resource sharing scheme for heterogeneous networksHUANG, Chenn-Jung; HU, Kai-Wen; CHEN, You-Jia et al.Computer networks (1999). 2009, Vol 53, Num 7, pp 1087-1098, issn 1389-1286, 12 p.Article

A review of biometric technology along with trends and prospectsUNAR, J. A; WOO CHAW SENG; ABBASI, Almas et al.Pattern recognition. 2014, Vol 47, Num 8, pp 2673-2688, issn 0031-3203, 16 p.Article

BlindIdM: A privacy-preserving approach for identity management as a serviceNUNEZ, David; AGUDO, Isaac.International journal of information security (Print). 2014, Vol 13, Num 2, pp 199-215, issn 1615-5262, 17 p.Article

To Federate or Not To Federate: A Reputation-Based Mechanism to Dynamize Cooperation in Identity ManagementCABARCOS, Patricia Arias; ALMENAREZ, Florina; GOMEZ MARMOL, Félix et al.Wireless personal communications. 2014, Vol 75, Num 3, pp 1769-1786, issn 0929-6212, 18 p.Article

Federated Identity Management Systems: A Privacy-Based Characterization : Identity IntegrityBIRRELL, Eleanor; SCHNEIDER, Fred B.IEEE security & privacy. 2013, Vol 11, Num 5, pp 36-48, issn 1540-7993, 13 p.Article

Open Social Networking for Online CollaborationFRANCHI, Enrico; POGGI, Agostino; TOMAIUOLO, Michele et al.International journal of e-collaboration. 2013, Vol 9, Num 3, pp 50-68, issn 1548-3673, 19 p.Article

Identity Managementin—Privacy We Trust: Bridging the Trust Gap in ehealth Environments : Healthcare ITTORMO, Ginés Dolera; MARMOL, Félix Gomez; GIRAO, Joao et al.IEEE security & privacy. 2013, Vol 11, Num 6, pp 34-41, issn 1540-7993, 8 p.Article

Trusted computing enhanced user authentication with OpenID and trustworthy user interfaceLEICHER, Andreas; SCHMIDT, Andreas U; SHAH, Yogendra et al.International journal of internet technology and secured transactions (Print). 2011, Vol 3, Num 4, pp 331-353, issn 1748-569X, 23 p.Article

Smart AppStore: Expanding the Frontiers of Smartphone Ecosystems : Mobile Application SecurityMARMOL, Félix Gómez; ROZINAJ, Gregor; SCHUMANN, Sebastian et al.Computer (Long Beach, CA). 2014, Vol 47, Num 6, pp 42-47, issn 0018-9162, 6 p.Article

  • Page / 2