• No results found

Trust and identity

Identity positioning for trust :  a narrative analysis on consultant identity construction

Identity positioning for trust : a narrative analysis on consultant identity construction

... on trust and identity. The various bases for trust are described, namely identity, structural, and dispositional based ...bases, identity trust is highlighted as the most ...

150

Cisco Trust and Identity Management Solutions

Cisco Trust and Identity Management Solutions

... Cisco Trust and Identity Management Solutions Terms and Definitions in Identity While this mitigates against port piggybacking, it also impedes host ...

32

Negotiating Trust in Identity Metasystem

Negotiating Trust in Identity Metasystem

... sign-on, identity provider auto discovery, and user privacy. But identity provider dis- covery is hard in the general use ...fake identity provider. SAML requires IdP and SP to establish trust ...

13

Trust Requirements in Identity Management

Trust Requirements in Identity Management

... efficiency. Identity management requires an integrated and often complex infrastructure where all involved parties must be trusted for specific purposes depending on their ...the trust relationships ...

10

Reducing  Trust  in  the  PKG  in  Identity  Based  Cryptosystems

Reducing Trust in the PKG in Identity Based Cryptosystems

... an identity is done in a threshold ...placing trust in a single entity by making the system ...his identity to each of them and get a private key component (which has to be done over a secure ...

18

Trust based Identity Provisioning for Cloud Computing

Trust based Identity Provisioning for Cloud Computing

... enable identity federation and management through features such as identity/account linkage, single sign on, and simple session management ...of Trust). In this there must be trust and ...

80

Analysing Trust Issues in Cloud Identity Environments

Analysing Trust Issues in Cloud Identity Environments

... A trust management framework for assessing the trustworthiness of a cloud identity provider can be developed that aggregates and manages trust-related information from different sources within and ...

15

Analysing Trust Issues in Cloud Identity Environments

Analysing Trust Issues in Cloud Identity Environments

... A trust management framework for assessing the trustworthiness of a cloud identity provider can be developed that aggregates and manages trust-related information from different sources within and ...

16

Immigration, national identity and political trust in European democracies

Immigration, national identity and political trust in European democracies

... ten-point trust index. 14 Our argument about the effect of national identity constructions on perceptions of political institutions revolves around incompatibility between individual constructions of ...

64

Dynamic Trust-based Recertifications in Identity and Access Management

Dynamic Trust-based Recertifications in Identity and Access Management

... quality identity management – particularly with respect to correct and consistent access control – is ...of trust. We thereto propose a trust-based recertification model and demonstrate its benefits ...

5

Integrating identity, strategy and communications for trust, loyalty and commitment

Integrating identity, strategy and communications for trust, loyalty and commitment

... of identity (guidelines, personality and positioning) have an influence on the strategy of the brand (brand identity has positive impacts on brand’s strategy), which leads to a more synergistic and ...

36

Integrating identity, strategy and communications for trust, loyalty and commitment

Integrating identity, strategy and communications for trust, loyalty and commitment

... In future research, the number of channels studied could be extended; indeed, there may well be new ones soon. In addition, this study used multiple constructs and measurements and worked within a retail setting in the ...

35

A Calculus of Trust and Its Application to PKI and Identity Management

A Calculus of Trust and Its Application to PKI and Identity Management

... throughout identity management mech- ...shared identity and credential information, how their partners protect the information, and the quality of identity information they provide; individuals ...

15

Trust, Identity and Access Management for the Cloud Operating System

Trust, Identity and Access Management for the Cloud Operating System

... SinglePoint Trust Cloud collects consistent usage logs of all activity on the Amazon EC2 and SaaS ...SinglePoint Trust Cloud makes it easy to meet national and international data governance ...SinglePoint ...

6

Integrating identity, strategy and communications for trust, loyalty and commitment

Integrating identity, strategy and communications for trust, loyalty and commitment

... In future research, the number of channels studied could be extended; indeed, there may well be new ones soon. In addition, this study used multiple constructs and measurements and worked within a retail setting in the ...

35

Creating Trust Online TM. Identity & Trust Assurance in a changing standards environment. *(Extended Validation)

Creating Trust Online TM. Identity & Trust Assurance in a changing standards environment. *(Extended Validation)

... not trust buying online. To stem this erosion of trust, EV SSL certificates, for the first time, let customers visibly see that they are doing business with an identity verified ...

9

Federal Identity, Credential, and Access Management Trust Framework Solutions

Federal Identity, Credential, and Access Management Trust Framework Solutions

... Process Trust Criteria Comment the opportunity for the non-vigilant Claimant to reveal a token authenticator (to an unauthorized party) that can be used to masquerade as the Claimant to the real ...the ...

62

Formulating Methodology to Build a Trust Framework for Cloud Identity Management

Formulating Methodology to Build a Trust Framework for Cloud Identity Management

... and identity providers, so the latter could not trace an end users’ ...the identity provider and the service provider could exchange information even if the end users go ...the identity provider, ...

10

A New Trust Model for Improved Identity Privacy in Cellular Networks

A New Trust Model for Improved Identity Privacy in Cellular Networks

... subscriber’s identity pri- vacy, and LTE is no ...the trust model adopted in these ...of identity privacy by many ...his/her identity to explore various attacks - is quite alarm- ...new ...

8

A Security Incident Response Trust Framework for Federated Identity (Sirtfi)

A Security Incident Response Trust Framework for Federated Identity (Sirtfi)

... Introduction Trust Federations, which provide foundation services that enable authentication and authorisation systems to extend across organisational boundaries, are operated within many nations in support of ...

5

Show all 10000 documents...

Related subjects