2009
DOI: 10.1109/mc.2009.168
|View full text |Cite
|
Sign up to set email alerts
|

Trusted Identity for All: Toward Interoperable Trusted Identity Management Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…This article captures various security and privacy issues revolving around the use of biometrics and forensics drawing on the intertwined concepts of "personally identifiable information" (PII) (Narayanan & Shmatikov, 2010) and interoperability (Pacyna, Rutkowski, Sarma, & Takahashi, 2009). The emphasis throughout is on quantitative performance and proper validation for uncontrolled settings, variable demographics, and distributed biometric recognition operations, e.g., expected rates of correct identification and/or rates of misidentification.…”
Section: Discussionmentioning
confidence: 99%
“…This article captures various security and privacy issues revolving around the use of biometrics and forensics drawing on the intertwined concepts of "personally identifiable information" (PII) (Narayanan & Shmatikov, 2010) and interoperability (Pacyna, Rutkowski, Sarma, & Takahashi, 2009). The emphasis throughout is on quantitative performance and proper validation for uncontrolled settings, variable demographics, and distributed biometric recognition operations, e.g., expected rates of correct identification and/or rates of misidentification.…”
Section: Discussionmentioning
confidence: 99%
“…For example, some Blockchain platforms have been modified as Blockchain-based transaction processing systems (TPS) [30] for the preservation of confidentiality. The use of personally identifiable attributes constituting a digital identity is an integral part of service transactions over networks and identity trust is being calling in question [31].…”
Section: Background Study a Personally Identifiable Informationmentioning
confidence: 99%
“…Such policies can be specified on any role, entity, action, or resource within the federation. In recently developed architectures (Pacyna et al, 2009;Kellomäki, 2009) it is possible to dynamically define and update such access control policies. Moreover, striving for high flexibility, service federations are pushed to develop access control solutions that are decentralized and application-independent (Pacyna et al, 2009).…”
Section: Introductionmentioning
confidence: 99%
“…In recently developed architectures (Pacyna et al, 2009;Kellomäki, 2009) it is possible to dynamically define and update such access control policies. Moreover, striving for high flexibility, service federations are pushed to develop access control solutions that are decentralized and application-independent (Pacyna et al, 2009). For example, the architectural style of service federations usually keeps the application specific logic and the authorization infrastructure as separated aspects.…”
Section: Introductionmentioning
confidence: 99%