Author of the publication

Integrierter Shibboleth Identity Provider auf Basis verteilter Identitätsdaten.

, , and . DFN-Forum Kommunikationstechnologien, volume P-166 of LNI, page 73-82. GI, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Peer-to-Peer Framework for Electronic Markets., , , , , and . Peer-to-Peer Systems and Applications, volume 3485 of Lecture Notes in Computer Science, Springer, (2005)A Consistency Model for Identity Information in Distributed Systems., , and . COMPSAC, page 252-261. IEEE Computer Society, (2010)Extension for information card systems to achieve User-Controlled Automated Identity Delegation., , , and . Integrated Network Management, page 1188-1191. IEEE, (2011)Combining Service-Orientation and Peer-to-Peer Networks., , , , and . KiVS Kurzbeiträge und Workshop, volume P-61 of LNI, page 181-184. GI, (2005)Autonome Kommunikationsinfrastrukturen. Eine praxisnahe Betrachtung., , , and . Praxis der Informationsverarbeitung und Kommunikation, 31 (2): 69-75 (2008)Ensuring reproducibility through tool-based simulation process management., , and . SimuTools, page 41. ICST/ACM, (2010)Decentralized Bootstrapping of P2P Systems: A Practical View., and . Networking, volume 5550 of Lecture Notes in Computer Science, page 703-715. Springer, (2009)FedWare: Middleware Services to Cope with Information Consistency in Federated Identity Management., , and . ARES, page 228-235. IEEE Computer Society, (2010)On the Challenge of Assessing Overlay Topology Adaptation Mechanisms., and . Peer-to-Peer Computing, page 145-147. IEEE Computer Society, (2005)BitMON: A Tool for Automated Monitoring of the BitTorrent DHT., , , and . Peer-to-Peer Computing, page 1-2. IEEE, (2010)