2013
DOI: 10.1016/j.mcm.2012.06.010
|View full text |Cite
|
Sign up to set email alerts
|

User-centric identity management using trusted modules

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0
2

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 19 publications
(39 citation statements)
references
References 4 publications
0
37
0
2
Order By: Relevance
“…The architecture from [13] is used because it meets several security and privacy requirements. It allows for selective disclosure of attributes and their properties: these are only released if allowed by the access policy.…”
Section: Security and Privacy Requirementsmentioning
confidence: 99%
See 4 more Smart Citations
“…The architecture from [13] is used because it meets several security and privacy requirements. It allows for selective disclosure of attributes and their properties: these are only released if allowed by the access policy.…”
Section: Security and Privacy Requirementsmentioning
confidence: 99%
“…In addition, some identity management systems (e.g. [13], [1]) rely on the secure computing environment of trusted modules.…”
Section: Designmentioning
confidence: 99%
See 3 more Smart Citations