Go to:
Logótipo
Você está em: Start > Publications > View > Protecting Privacy of Identities in Federated Operator Environments
Map of Premises
Principal
Publication

Protecting Privacy of Identities in Federated Operator Environments

Title
Protecting Privacy of Identities in Federated Operator Environments
Type
Article in International Conference Proceedings Book
Year
2005
Authors
Benjamin Weyl
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
AF Gomez Skarmeta
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
R Marin Lopez
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Parijat Mishra
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Christian Hauser
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Holger Ziemek
(Author)
Other
The person does not belong to the institution. The person does not belong to the institution. The person does not belong to the institution. Without AUTHENTICUS Without ORCID
Conference proceedings International
Scientific classification
FOS: Natural sciences > Computer and information sciences
Other information
Abstract (EN): Personalized, mobile, and location-aware services definitely require the federation of administrative domains, ie, access network operators, content and service providers. Various federated operator scenarios, reflecting different levels of content and service aggregation, require the secure setup of a Circle of Trust. Standards and technologies, such as proposed by the Liberty Alliance Project or by application of the Security Assertion Markup Language (SAML), already support the idea of building ..
Language: English
Type (Professor's evaluation): Scientific
Documents
We could not find any documents associated to the publication.
Recommend this page Top
Copyright 1996-2025 © Faculdade de Medicina Dentária da Universidade do Porto  I Terms and Conditions  I Acessibility  I Index A-Z
Page created on: 2025-07-28 at 23:35:59 | Privacy Policy | Personal Data Protection Policy | Whistleblowing | Electronic Yellow Book