In a typical roaming scenario the accounting information received from the roaming partner is expected to be trustworthy. Things like fear of losing one's reputation have been working as disincentives for fraudulent behaviour between the large operators. However, when smaller players enter the market and steps are taken towards more dynamic relationships as in the visions of ubiquitous computing environments, the need for reliable records becomes paramount. Thus, secure accounting mechanisms are needed for ensuring correct compensation amongst the interoperating partners. On top of that, the partners need to be authorised with sufficient granularity to be able to engage in the transaction in the first place. The mere authentication sho...
The notion of identity metasystem has been introduced as the means to ensure inter-operability among...
In the context of identity management, a major research topic is the establishment of trust relation...
This paper describes a design for an authentication service for a very large scale, very long lifeti...
IP is often seen as the “lingua franca” of modern communication. It provides interoperability across...
IP is often seen as the “lingua franca” of modern communication. It provides interoperability across...
New types of service usages emerge every day in the Internet. Service usage could be Wireless Local ...
The widespread sharing of economy platforms has been recognized as a disruptive technology to every ...
Abstract — Through the combination of the public-key digi-tal signature and the hash-chaining techni...
New families of protocol, based on communication over human-based side channels, permit secure pairi...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
The current Internet is based on architecture created years ago. This architecture does not provide ...
With the advent of a new paradigm in computing known as Cloud Computing which offers computing as a ...
Abstract Service mobility is spotlighted on the need to retain access to service across different de...
In the context of mobility protocols such as Mobile IP, authentication, authorization and accounting...
The notion of identity metasystem has been introduced as the means to ensure inter-operability among...
The notion of identity metasystem has been introduced as the means to ensure inter-operability among...
In the context of identity management, a major research topic is the establishment of trust relation...
This paper describes a design for an authentication service for a very large scale, very long lifeti...
IP is often seen as the “lingua franca” of modern communication. It provides interoperability across...
IP is often seen as the “lingua franca” of modern communication. It provides interoperability across...
New types of service usages emerge every day in the Internet. Service usage could be Wireless Local ...
The widespread sharing of economy platforms has been recognized as a disruptive technology to every ...
Abstract — Through the combination of the public-key digi-tal signature and the hash-chaining techni...
New families of protocol, based on communication over human-based side channels, permit secure pairi...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
The current Internet is based on architecture created years ago. This architecture does not provide ...
With the advent of a new paradigm in computing known as Cloud Computing which offers computing as a ...
Abstract Service mobility is spotlighted on the need to retain access to service across different de...
In the context of mobility protocols such as Mobile IP, authentication, authorization and accounting...
The notion of identity metasystem has been introduced as the means to ensure inter-operability among...
The notion of identity metasystem has been introduced as the means to ensure inter-operability among...
In the context of identity management, a major research topic is the establishment of trust relation...
This paper describes a design for an authentication service for a very large scale, very long lifeti...