2011
DOI: 10.1007/978-3-642-22633-5_11
|View full text |Cite
|
Sign up to set email alerts
|

User-Centric Identity Management Using Trusted Modules

Abstract: Many service providers want to control access to their services and offer personalized services. This implies that the service provider requests and stores personal attributes. However, many service providers are not sure about the correctness of attributes that are disclosed by the user during registration. Federated identity management systems aim at increasing the user-friendliness of authentication procedures, while at the same time ensuring strong authentication to service providers. This paper presents a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2014
2014

Publication Types

Select...
4
1

Relationship

4
1

Authors

Journals

citations
Cited by 9 publications
(2 citation statements)
references
References 15 publications
0
2
0
Order By: Relevance
“…anonymous/pseudonymous authentication and selective disclosure) that anonymous credentials do. A few exceptions, such as the German eID system and the system proposed in [11], do provide similar privacy preserving features.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…anonymous/pseudonymous authentication and selective disclosure) that anonymous credentials do. A few exceptions, such as the German eID system and the system proposed in [11], do provide similar privacy preserving features.…”
Section: Related Workmentioning
confidence: 99%
“…If the PIN verification succeeds (8), the card signs the challenge and transfers the resulting signature and the certificate (cert u ) to the PAL (9-10). The PAL now verifies the authentication (11)(12). If the verification succeeds, the PAL extracts the requested attributes (atts) from cert u (13).…”
Section: Protocolsmentioning
confidence: 99%