Author of the publication

Information Assurance in Federated Identity Management: Experimentations and Issues.

, , and . WISE, volume 3306 of Lecture Notes in Computer Science, page 78-89. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Permission Management System: Permission as a Service in Cloud Computing., , and . COMPSAC Workshops, page 371-375. IEEE Computer Society, (2010)Similarity analysis of shellcodes in drive-by download attack kits., , and . CollaborateCom, page 687-694. ICST / IEEE, (2012)An Interactive Design Environment for C-Based High-Level Synthesis of RTL Processors., , , and . IEEE Trans. VLSI Syst., 16 (4): 466-475 (2008)Role-based privilege and trust management., and . Comput. Syst. Sci. Eng., (2005)Addressing Insider Threats and Information Leakage., , , and . JoWUA, 2 (1): 1-3 (2011)Role-Based Privilege Management Using Attribute Certificates and Delegation., , and . TrustBus, volume 3184 of Lecture Notes in Computer Science, page 100-109. Springer, (2004)Ensuring information assurance in federated identity management., , and . IPCCC, page 821-826. IEEE, (2004)An Enhanced Approach to using Virtual Directories for Protecting Sensitive Information., and . WOSIS, page 36-45. INSTICC Press, (2009)Detecting insider activity using enhanced directory virtualization., and . Insider Threats@CCS, page 29-36. ACM, (2010)Using A Two Dimensional Colorized Barcode Solution for Authentication in Pervasive Computing., and . ICPS, page 173-180. IEEE Computer Society, (2006)