Security, Privacy and Trust in Cloud Systems 2013
DOI: 10.1007/978-3-642-38586-5_6
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management in Cloud Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 26 publications
0
1
0
Order By: Relevance
“…(iii) Information management : Functionalities of the IMS must cater for attribute aggregation, revocation and defined disclosure levels. In addition, threats to IMS were categorised as threats to trust level between the entities of the IMS, threats from attack to functioning of the system and threats to user privacy [6]. Future models of IMS design will need to have a huge emphasis towards ensuring user privacy in the online transactions [7] [8].…”
Section: Related Workmentioning
confidence: 99%
“…(iii) Information management : Functionalities of the IMS must cater for attribute aggregation, revocation and defined disclosure levels. In addition, threats to IMS were categorised as threats to trust level between the entities of the IMS, threats from attack to functioning of the system and threats to user privacy [6]. Future models of IMS design will need to have a huge emphasis towards ensuring user privacy in the online transactions [7] [8].…”
Section: Related Workmentioning
confidence: 99%