Author of the publication

Policy Languages for Digital Identity Management in Federation Systems.

, , and . POLICY, page 54-66. IEEE Computer Society, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Verification of Receipts from M-commerce Transactions on NFC Cellular Phones., , , and . CEC/EEE, page 36-43. IEEE Computer Society, (2008)Password policy simulation and analysis., , and . Digital Identity Management, page 1-10. ACM, (2007)Platform capability based identity management for scalable and secure cloud service access., and . GLOBECOM Workshops, page 763-768. IEEE, (2012)Trust Negotiation in Identity Management., , and . IEEE Secur. Priv., 5 (2): 55-63 (2007)SOC and Academia - Building Resilient Systems., and . TPS-ISA, page 396-399. IEEE, (2023)Automatic Compliance of Privacy Policies in Federated Digital Identity Management., , , and . POLICY, page 89-92. IEEE Computer Society, (2008)Establishing and protecting digital identity in federation systems., , and . J. Comput. Secur., 14 (3): 269-300 (2006)Establishing and protecting digital identity in federation systems., , and . Digital Identity Management, page 11-19. ACM, (2005)Privacy preserving multi-factor authentication with biometrics., , and . Digital Identity Management, page 63-72. ACM, (2006)Biometrics-based identifiers for digital identity management., , , , and . IDtrust, page 84-96. ACM, (2010)