Cited By
View all- Leskinen J(2012)Evaluation Criteria for Future Identity ManagementProceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2012.153(801-806)Online publication date: 25-Jun-2012
- Li PWen JDong JTang F(2011)An approach of authentication base on modified digital identity metasystem in service-oriented architectureProceedings of the 2011 international conference on Web information systems and mining - Volume Part I10.5555/2045561.2045605(304-311)Online publication date: 24-Sep-2011
- Kirkpatrick MKerr SSandhu RBertino E(2011)Enforcing physically restricted access control for remote dataProceedings of the first ACM conference on Data and application security and privacy10.1145/1943513.1943540(203-212)Online publication date: 21-Feb-2011
- Show More Cited By