[go: up one dir, main page]

Buitelaar et al., 2009 - Google Patents

Towards requirements for privacy-friendly identity management in eGovernment

Buitelaar et al., 2009

View PDF
Document ID
2517316063802128118
Author
Buitelaar J
Meints M
Kindt E
Publication year

External Links

Snippet

This report describes in a multi-disciplinary way requirements for privacyfriendly identity management in eGovernment. The cooperation among the large number of disparate entities is compared with so-called 'circles of trust', whereby identity and service providers …
Continue reading at research.tilburguniversity.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Zissis et al. Addressing cloud computing security issues
Fernandez-Buglioni Security patterns in practice: designing secure architectures using software patterns
Bhargav-Spantzel et al. User centricity: a taxonomy and open issues
Hafner et al. Security engineering for service-oriented architectures
Trèek An integral framework for information systems security management
Kyriakidou et al. Decentralized identity with applications to security and privacy for the internet of things
Shaik et al. Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-World Applications for Enhancing Security, Privacy, and Scalability in Modern Digital Infrastructures
Ding et al. Bloccess: enabling fine-grained access control based on blockchain
Stapleton et al. Security Without Obscurity: A Guide to PKI Operations
Ghanmi et al. Blockchain‐cloud integration: comprehensive survey and open research issues
Linklater et al. Toward distributed key management for offline authentication
Delgado-von-Eitzen et al. Blockchain beyond immutability: Application firewalls on Ethereum-based platforms
Sharif et al. Protecting digital identity wallet: a threat model in the age of eidas 2.0
Rosado et al. Security services architecture for secure mobile grid systems
Kumagai et al. Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology
Aldeco-Pérez et al. Securing provenance-based audits
García et al. Privacy Preserving Enablers for Data Space Ecosystems
Hulsebosch et al. Quality authenticator scheme
Bistarelli et al. Policy-based Credential Disclosure in SSI by Using ORCON-based Access Control
Wagner et al. Unified Data Model for Tuple-Based Trust Scheme Publication
Ziegler et al. Designing a security incident response process for self-sovereign identities
Buitelaar et al. Towards requirements for privacy-friendly identity management in eGovernment
Mihailescu et al. Cryptanalysis Attacks and Techniques
Bolgouras et al. Enabling qualified anonymity for enhanced user privacy in the digital era
Friebe Secure and Privacy-preserving Decentralized Identities