In the context of identity management, a major research topic is the establishment of trust relationships between multiple identifier domains. Conventional approaches such as cross certification, spanning certificate authorities or mirroring of user databases result in substantial technical overhead. A possible approach is the usage of already existing architectures such as the infrastructure provided by trusted computing technology. The goal of this thesis is the development of a concept that allows a user from a certain identifier domain to access a service at a service provider belonging to a foreign identifier domain by using a ticket issued by an identity provider located in the primary identifier domain. To decide whether the foreign ...
In scientific infrastructures researchers accessing computing and other resources (e.g., instruments...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract. Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important...
The establishment of trust relationships across multiple identifier domains in identity management a...
The establishment of trust relationships across multiple identifier domains in identity management a...
With the advent of a new paradigm in computing known as Cloud Computing which offers computing as a ...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Degree of identity assurance has been realized in several different approaches to authentication ass...
Degree of identity assurance has been realized in several different approaches to authentication ass...
International audienceWith a boom in online services generally accessed through a login/password cou...
Sharing information and maintaining privacy and security is a requirement in distributed environment...
Distributed authorization provides the ability to control access to resources spread over the Intern...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud provi...
In scientific infrastructures researchers accessing computing and other resources (e.g., instruments...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract. Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important...
The establishment of trust relationships across multiple identifier domains in identity management a...
The establishment of trust relationships across multiple identifier domains in identity management a...
With the advent of a new paradigm in computing known as Cloud Computing which offers computing as a ...
Trusted Computing is a security base technology that will perhaps be ubiquitous in a few years in pe...
In a client-server environment that deals with multiple clients,there is a need to provide a mechani...
Degree of identity assurance has been realized in several different approaches to authentication ass...
Degree of identity assurance has been realized in several different approaches to authentication ass...
International audienceWith a boom in online services generally accessed through a login/password cou...
Sharing information and maintaining privacy and security is a requirement in distributed environment...
Distributed authorization provides the ability to control access to resources spread over the Intern...
This paper describes ongoing research and development aimed at creating a trustworthy software-based...
In recent years, enterprise applications have begun to migrate from a local hosting to a cloud provi...
In scientific infrastructures researchers accessing computing and other resources (e.g., instruments...
This thesis explores how hardware security technologies can be applied to satisfy the diverse set of...
Abstract. Nowadays, anonymity and privacy protecting mechanisms are becoming more and more important...