Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_10
M. Hansen
{"title":"Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals","authors":"M. Hansen","doi":"10.1007/978-3-642-37282-7_10","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_10","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115039628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_2
M. Hansen
{"title":"Data Protection by Default in Identity-Related Applications","authors":"M. Hansen","doi":"10.1007/978-3-642-37282-7_2","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_2","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123931770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_8
Ebenezer Paintsil, Lothar Fritsch
{"title":"Executable Model-Based Risk Assessment Method for Identity Management Systems","authors":"Ebenezer Paintsil, Lothar Fritsch","doi":"10.1007/978-3-642-37282-7_8","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_8","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133143741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_6
A. Fongen, Federico Mancini
{"title":"Identity Management and Integrity Protection in Publish-Subscribe Systems","authors":"A. Fongen, Federico Mancini","doi":"10.1007/978-3-642-37282-7_6","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_6","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121044569","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_12
O. Henniger, Dimitar Nikolov
{"title":"Extending EMV Payment Smart Cards with Biometric On-Card Verification","authors":"O. Henniger, Dimitar Nikolov","doi":"10.1007/978-3-642-37282-7_12","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_12","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"125 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124141385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_3
R. Peeters, A. Pashalidis
{"title":"Privacy-Friendly Checking of Remote Token Blacklists","authors":"R. Peeters, A. Pashalidis","doi":"10.1007/978-3-642-37282-7_3","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_3","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116120374","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_7
Henning Klevjer, Kent A. Varmedal, A. Jøsang
{"title":"Extended HTTP Digest Access Authentication","authors":"Henning Klevjer, Kent A. Varmedal, A. Jøsang","doi":"10.1007/978-3-642-37282-7_7","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_7","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116895368","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_5
Pim Vullers, G. Alpár
{"title":"Efficient Selective Disclosure on Smart Cards Using Idemix","authors":"Pim Vullers, G. Alpár","doi":"10.1007/978-3-642-37282-7_5","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_5","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"369 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114863136","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_13
M. Ferdous, R. Poet
{"title":"Dynamic Identity Federation Using Security Assertion Markup Language (SAML)","authors":"M. Ferdous, R. Poet","doi":"10.1007/978-3-642-37282-7_13","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_13","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116557320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_9
E. Snekkenes
{"title":"Position Paper: Privacy Risk Analysis Is about Understanding Conflicting Incentives","authors":"E. Snekkenes","doi":"10.1007/978-3-642-37282-7_9","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_9","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127273610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}