Keyphrases
- identity management
- authentication protocol
- authentication mechanism
- service delivery
- security analysis
- web services
- user centric
- security services
- cloud computing
- access control
- key distribution
- data encryption
- public services
- location aware
- service composition
- personal information
- context aware
- low cost
- end users
- private cloud
- service oriented architecture
- ubiquitous computing
- service oriented
- information security
- trust relationships
- real time
- virtual private network
- electronic payment
- trusted third party
- mobile services
- service discovery