Author:
Bussard Laurent,Nano Anna,Pinsdorf Ulrich
Publisher
Springer Science and Business Media LLC
Reference23 articles.
1. Becker MY, Fournet C, Gordon AD. Design and semantics of a decentralized authorization language. 20th IEEE Computer Security Foundations Symposium (CSF). 2007.
2. Becker MY, Mackay JF, Dillaway B. Abductive authorization credential gathering. IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY). 2009.
3. Bussard L, Di Nitto E, Nano A, Nano O, Ripa G. An approach to identity management for service centric systems. ServiceWave 2008, Madrid, Spain. 2008.
4. Cánovas O, López G, Gómez-Skarmeta AF. Acredential conversion service for saml-based scenarios. In: Public key infrastructure, volume 3093 of Lecture Notes in Computer Science (LNCS). Berlin/Heidelberg: Springer; 2004. p. 297-305. ISBN 978-3-540-22216-3.
5. Fitzpatrick B, Recordon D, Hardt D, Bufu J, Hoyt J. Openid authentication 2.0 -final. Specification, OpenID Community, Dec. 2007. http://openid.net/specs/openid-authentication-2_0.html .
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Controlled flexibility in blockchain-based collaborative business processes;Information Systems;2022-02
2. Dynamic Role Binding in Blockchain-Based Collaborative Business Processes;Advanced Information Systems Engineering;2019
3. Taxonomy of Delegation Model;2015 12th International Conference on Information Technology - New Generations;2015-04
4. A Critical Comparison of Trusted Computing and Trust Management Technologies;International Journal of Cyber Warfare and Terrorism;2014-10
5. Trust Management and Delegation for the Administration of Web Services;Organizational, Legal, and Technological Dimensions of Information System Administration;2014