Login / Signup
A Survey of Security Analysis in Federated Identity Management.
Sean Simpson
Thomas Groß
Published in:
Privacy and Identity Management (2016)
Keyphrases
</>
security analysis
identity management
access control
security requirements
public key
smart card
personal information
cloud computing
user centric
high security
access control policies
user authentication
digital libraries
encryption scheme
authentication protocol
data sources
distributed systems
case study