Secure interoperation of identity managements among different circles of trust.
Jianyong ChenGuihua WuZhen JiPublished in: Comput. Stand. Interfaces (2011)
Keyphrases
- identity management
- trust relationships
- security services
- trusted computing
- access control
- trust model
- trust evaluation
- hough transform
- border control
- semantic web services
- personal information
- virtual communities
- data sources
- security protocols
- security analysis
- trust management
- knowledge sharing
- security issues
- databases
- heterogeneous data
- key management
- database systems
- cloud computing
- privacy concerns
- public key infrastructure
- data security
- sensitive data
- security requirements
- semantic web
- wireless sensor networks
- website