The world of the twenty-?rst century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identi?cation is growing, not only in companies and organizations, but also in the world at large. Identity management is put under pressure, due to the growing number of frauds who want to hide their true identity. Identity management challenges the information security research community to focus on interdisciplinary and holistic approaches while retaining the bene?ts of previous research...
The world of the twenty-?rst century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, inc...
This book constitutes the refereed proceedings of the Third IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 2013, held in London, UK, in April 2013. The 6 refereed full and 4 short papers presented together with 3 short position papers and a keynote paper were selected from 26 submissions. The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.
This book constitutes the refereed proceedings of the Third IFIP WG 11.6 Working Conference on Policies and Research in Identity Management, IDMAN 201...
The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, risk management of identity management, identity management with smart cards, and federated identity management.
The papers have been organized into topical sections on privacy and identity management, anonymous credentials, authentication and access control, ris...