[PDF][PDF] An identity-and trust-based computational model for privacy

MM Anwar - 2008 - harvest.usask.ca
The seemingly contradictory need and want of online users for information sharing and
privacy has inspired this thesis work. The crux of the problem lies in the fact that a user has …

Research in techniques of personal identity management

W Liu, P Ren, D Sun, Z Wang - 2012 International Conference …, 2012 - ieeexplore.ieee.org
This paper proposed a model of 7-Phase Personal Identity Management Cycle which can
capture important actors and events that happen around the management issues of a …

A Technology and Process Analysis for Contemporary Identity Management Frameworks

A Ng, P Watters, S Chen - Inventive Approaches for Technology …, 2014 - igi-global.com
The digital profile of a person has become one of the tradable digital commodities over the
Internet. Identity management has gained increasing attention from both enterprises and …