Proceedings of the 5th ACM Workshop on Digital Identity Management 2009
DOI: 10.1145/1655028.1655040
|View full text |Cite
|
Sign up to set email alerts
|

Modelling the impact of virtual identities on communication infrastructures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 18 publications
0
5
0
Order By: Relevance
“…Barisch introduced an analytical model to evaluate the overhead caused by V ID concept on the network infrastructure using BCMP theorem [12]. Therefore, in the current work, the proposed algorithms for V ID will be evaluated and compared against that model [43] for the same impact.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations
“…Barisch introduced an analytical model to evaluate the overhead caused by V ID concept on the network infrastructure using BCMP theorem [12]. Therefore, in the current work, the proposed algorithms for V ID will be evaluated and compared against that model [43] for the same impact.…”
Section: Related Workmentioning
confidence: 99%
“…A comparison between the overhead introduced by the V ID concept of the proposed models and the state of the art Barisch's model [43] is done. The used key metrics for performance evaluation is similar in both Barisch's model and the proposed models.…”
Section: Ibe and Pbe Versus Barisch's Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…Another milestone is the frameworks such as the one introduced by Ref. 28 to trace the history of how a user's identity information is handled after it is transferred across domains of control. Finally Ref.…”
Section: Cyber-crime and Privacymentioning
confidence: 99%