Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_1
G. Alpár, B. Jacobs
{"title":"Towards Practical Attribute-Based Identity Management: The IRMA Trajectory","authors":"G. Alpár, B. Jacobs","doi":"10.1007/978-3-642-37282-7_1","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_1","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128830152","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_11
E. Poll, Joeri de Ruiter
{"title":"The Radboud Reader: A Minimal Trusted Smartcard Reader for Securing Online Transactions","authors":"E. Poll, Joeri de Ruiter","doi":"10.1007/978-3-642-37282-7_11","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_11","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122980610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2013-04-08DOI: 10.1007/978-3-642-37282-7_14
Sanna Suoranta, Asko Tontti, J. Ruuskanen, T. Aura
{"title":"Logout in Single Sign-on Systems","authors":"Sanna Suoranta, Asko Tontti, J. Ruuskanen, T. Aura","doi":"10.1007/978-3-642-37282-7_14","DOIUrl":"https://doi.org/10.1007/978-3-642-37282-7_14","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"44 11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130406661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_3
M. Ivkovic, Klaus Stranacher
{"title":"Foreign Identities in the Austrian E-Government - An Interoperable eID Solution","authors":"M. Ivkovic, Klaus Stranacher","doi":"10.1007/978-3-642-17303-5_3","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_3","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"2018 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121090835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_7
John V. Scudder, A. Jøsang
{"title":"Personal Federation Control with the Identity Dashboard","authors":"John V. Scudder, A. Jøsang","doi":"10.1007/978-3-642-17303-5_7","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_7","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"319 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116532296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_2
H. Al-Sinani, C. Mitchell
{"title":"Using CardSpace as a Password Manager","authors":"H. Al-Sinani, C. Mitchell","doi":"10.1007/978-3-642-17303-5_2","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_2","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"74 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121497875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_6
B. V. Delft, M. Oostdijk
{"title":"A Security Analysis of OpenID","authors":"B. V. Delft, M. Oostdijk","doi":"10.1007/978-3-642-17303-5_6","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_6","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131182652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_1
Patrik Bichsel, J. Camenisch
{"title":"Mixing Identities with Ease","authors":"Patrik Bichsel, J. Camenisch","doi":"10.1007/978-3-642-17303-5_1","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_1","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130602385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_10
Hidehito Gomi
{"title":"Policy Provisioning for Distributed Identity Management Systems","authors":"Hidehito Gomi","doi":"10.1007/978-3-642-17303-5_10","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_10","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116924075","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2010-11-18DOI: 10.1007/978-3-642-17303-5_8
B. Mjaaland
{"title":"The Plateau: Imitation Attack Resistance of Gait Biometrics","authors":"B. Mjaaland","doi":"10.1007/978-3-642-17303-5_8","DOIUrl":"https://doi.org/10.1007/978-3-642-17303-5_8","url":null,"abstract":"","PeriodicalId":188160,"journal":{"name":"IFIP Conference on Policies and Research in Identity Management","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124102367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}