Authentication and Access Delegation with User-Released Certificates.
Lavinia EgidiMaurizio MelatoPublished in: SAC (2003)
Keyphrases
- access control
- identity management
- user authentication
- trust relationships
- user access
- role based access control
- security mechanisms
- user interface
- access control systems
- multiple users
- public key
- end users
- access control policies
- security policies
- user experience
- image authentication
- access rights
- web interface
- user queries
- user interaction
- user requests
- relevance feedback
- search engine
- public key infrastructure