Blockchain-based identity management systems: A review

Y Liu, D He, MS Obaidat, N Kumar, MK Khan… - Journal of network and …, 2020 - Elsevier
Identity management solutions are generally designed to facilitate the management of digital
identities and operations such as authentication, and have been widely used in real-world …

A Systematic Literature Mapping on Using Blockchain Technology in Identity Management

TTT Ngo, TA Dang, VV Huynh, TC Le - IEEE Access, 2023 - ieeexplore.ieee.org
Although blockchain is an emerging technology, it has been applied in a lot of domains by
leveraging its features. Traditional identity management systems have many issues …

O2O: Virtual private organizations to manage security policy interoperability

F Cuppens, N Cuppens-Boulahia, C Coma - Information Systems Security …, 2006 - Springer
Nowadays, the interaction between systems is absolutely essential to achieve business
continuity. There is a need to exchange and share services and resources. Unfortunately …

Mobile hosts in enterprise service integration

SN Srirama, M Jarke - International journal of Web …, 2009 - inderscienceonline.com
Mobile data services in combination with profluent web services are seemingly the path-
breaking domain in current information systems research. In the Mobile Web Service (MWS) …

Single sign-on for java web start applications using myproxy

T Fleury, J Basney, V Welch - Proceedings of the 3rd ACM workshop on …, 2006 - dl.acm.org
Single sign-on is critical for the usability of distributed systems. While there are several
authentication mechanisms which support single sign-on (eg Kerberos and X. 509), it may …

Flexible single sign-on for SIP: bridging the identity chasm

P Nie, JM Tapio, S Tarkoma… - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
Identity federation is a key requirement for today's distributed services. This technology
allows managed sharing of users' identity information between identity providers (IDP), and …

反导体系试训一体化环境开发集成方法研究

张国强, 刘小荷, 蒋方婷, 李志平 - 系统仿真学报, 2016 - china-simulation.com
构建反导体系试训一体化环境, 是促进反导体系战斗力快速形成的有效手段,
针对目前反导体系试训一体化环境无统一开发集成方法的现状, 在系统分析该环境对开发集成 …

Trust management for user-centric identity management on the internet

D Choi, SH Jin, H Yoon - 2007 IEEE International Symposium …, 2007 - ieeexplore.ieee.org
In user-centric identity management, user select IDP. There is no relationship between the
IDP and the relying web site. To evaluate the credential presented by a user and issued by …

[PDF][PDF] ADPP: ANovel ANOMALY DETECTION AND PRIVACY-PRESERVING FRAMEWORK USING BLOCKCHAIN AND NEURAL NETWORKS IN TOKENOMICS

W Yao, J Gu, W Du, FP Deek, G Wang - International Journal of …, 2022 - academia.edu
The increasing popularity of crypto assets has resulted in greater cryptocurrency investor
interest and more exposure in both industry and academia. Despite the substantial …

Interoperability of context based system policies using O2O contract

C Coma, N Cuppens-Boulahia… - … on Signal Image …, 2008 - ieeexplore.ieee.org
The evolution of today's markets and the high volatility of business requirements put an
increasing emphasis on the ability for systems to accommodate the changes required by …