Buitelaar et al., 2009 - Google Patents
Towards requirements for privacy-friendly identity management in eGovernmentBuitelaar et al., 2009
View PDF- Document ID
- 2517316063802128118
- Author
- Buitelaar J
- Meints M
- Kindt E
- Publication year
External Links
Snippet
This report describes in a multi-disciplinary way requirements for privacyfriendly identity management in eGovernment. The cooperation among the large number of disparate entities is compared with so-called 'circles of trust', whereby identity and service providers …
- 238000013459 approach 0 abstract 3
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Zissis et al. | Addressing cloud computing security issues | |
| Fernandez-Buglioni | Security patterns in practice: designing secure architectures using software patterns | |
| Bhargav-Spantzel et al. | User centricity: a taxonomy and open issues | |
| Hafner et al. | Security engineering for service-oriented architectures | |
| Trèek | An integral framework for information systems security management | |
| Kyriakidou et al. | Decentralized identity with applications to security and privacy for the internet of things | |
| Shaik et al. | Advanced Identity Access Management and Blockchain Integration: Techniques, Protocols, and Real-World Applications for Enhancing Security, Privacy, and Scalability in Modern Digital Infrastructures | |
| Ding et al. | Bloccess: enabling fine-grained access control based on blockchain | |
| Stapleton et al. | Security Without Obscurity: A Guide to PKI Operations | |
| Ghanmi et al. | Blockchain‐cloud integration: comprehensive survey and open research issues | |
| Linklater et al. | Toward distributed key management for offline authentication | |
| Delgado-von-Eitzen et al. | Blockchain beyond immutability: Application firewalls on Ethereum-based platforms | |
| Sharif et al. | Protecting digital identity wallet: a threat model in the age of eidas 2.0 | |
| Rosado et al. | Security services architecture for secure mobile grid systems | |
| Kumagai et al. | Distributed Public Key Certificate‐Issuing Infrastructure for Consortium Certificate Authority Using Distributed Ledger Technology | |
| Aldeco-Pérez et al. | Securing provenance-based audits | |
| García et al. | Privacy Preserving Enablers for Data Space Ecosystems | |
| Hulsebosch et al. | Quality authenticator scheme | |
| Bistarelli et al. | Policy-based Credential Disclosure in SSI by Using ORCON-based Access Control | |
| Wagner et al. | Unified Data Model for Tuple-Based Trust Scheme Publication | |
| Ziegler et al. | Designing a security incident response process for self-sovereign identities | |
| Buitelaar et al. | Towards requirements for privacy-friendly identity management in eGovernment | |
| Mihailescu et al. | Cryptanalysis Attacks and Techniques | |
| Bolgouras et al. | Enabling qualified anonymity for enhanced user privacy in the digital era | |
| Friebe | Secure and Privacy-preserving Decentralized Identities |