Author of the publication

User-Centric Identity Management: New Trends in Standardization and Regulation.

, , , and . IEEE Secur. Priv., 5 (4): 84-87 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Extending XACML Access Control Architecture for Allowing Preference-Based Authorisation., , and . TrustBus, volume 6264 of Lecture Notes in Computer Science, page 153-164. Springer, (2010)User-Centric Identity Management: New Trends in Standardization and Regulation., , , and . IEEE Secur. Priv., 5 (4): 84-87 (2007)Privacy Enforcement for IT Governance in Enterprises: Doing It for Real., , and . TrustBus, volume 3592 of Lecture Notes in Computer Science, page 226-235. Springer, (2005)Towards Accountable Management of Privacy and Identity Information., , and . ESORICS, volume 2808 of Lecture Notes in Computer Science, page 146-161. Springer, (2003)Introduction.. Digital Privacy - PRIME, volume 6545 of Lecture Notes in Computer Science, Springer, (2011)A Flexible Role-based Secure Messaging Service: Exploiting IBE Technology for Privacy in Health Care., , and . DEXA Workshops, page 432-437. IEEE Computer Society, (2003)Towards Accountable Management of Identity and Privacy: Sticky Policies and Enforceable Tracing Services., , and . DEXA Workshops, page 377-382. IEEE Computer Society, (2003)