Authentication and authorization infrastructures (AAIs): a comparative survey.
Javier LópezRolf OppligerGünther PernulPublished in: Comput. Secur. (2004)
Keyphrases
- access control
- security requirements
- trust negotiation
- trust relationships
- identity management
- authentication scheme
- comparative analysis
- fine grained
- security mechanisms
- trust management
- security policies
- data management
- conflict resolution
- neural network
- usage control
- identity authentication
- fragile watermarking
- user authentication
- open systems
- authentication protocol
- literature review