2007 41st Annual IEEE International Carnahan Conference on Security Technology 2007
DOI: 10.1109/ccst.2007.4373492
|View full text |Cite
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2009
2009
2016
2016

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…The browser must be a usercentered identity layer between the service provider and the user, leading to better control for user over his/her identity attributes [13]. Progress in digital identity management systems will become feasible to deploy user-centric paradigm which operate on a massive scale and control the full life cycle of digital identities from creation to termination, maintaining its major advantage that is, involvement in each transaction and improving its main drawback which is not being able to handle delegation [6] along with focusing on users, controlling what information is shared about them, the content of the information and who is allowed to access it [12]. www.ijacsa.thesai.org…”
Section: B the Results Of Solving Hierarchy Model Using Change Approachmentioning
confidence: 99%
See 1 more Smart Citation
“…The browser must be a usercentered identity layer between the service provider and the user, leading to better control for user over his/her identity attributes [13]. Progress in digital identity management systems will become feasible to deploy user-centric paradigm which operate on a massive scale and control the full life cycle of digital identities from creation to termination, maintaining its major advantage that is, involvement in each transaction and improving its main drawback which is not being able to handle delegation [6] along with focusing on users, controlling what information is shared about them, the content of the information and who is allowed to access it [12]. www.ijacsa.thesai.org…”
Section: B the Results Of Solving Hierarchy Model Using Change Approachmentioning
confidence: 99%
“…Claycomb et al [12] discussed that, the user control over the kind of information being kept, the actual content of the information and the authorizing individuals to view the information are the major motivations in the concept of usercentric identity management systems. Another motivation is privacy and confidentiality, accomplished by offering users the option about what is shared, and with whom it is shared.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, this approach uses a single serverbased key for encrypting all attributes. A user-centric approach to protecting directory attributes is described in [7]. This method is not dependent on a particular directory implementation.…”
Section: Previous Approachesmentioning
confidence: 99%