HCI Bibliography Home | HCI Conferences | IDTRUST Archive | Detailed Records | RefWorks | EndNote | Show Abstracts
IDTRUST Tables of Contents: 080910

Proceedings of the 2009 Symposium on Identity and Trust on the Internet

Fullname:Proceedings of the 8th symposium on Identity and trust on the Internet
Editors:Kent Seamons; Neal McBurnett; Tim Polk
Location:Gaithersburg, Maryland
Dates:2009-Apr-14 to 2009-Apr-16
Publisher:ACM
Standard No:ISBN: 1-60558-474-6, 978-1-60558-474-4; ACM DL: Table of Contents hcibib: IDTRUST09
Papers:10
Pages:131
Links:Conference Home Page
  1. Identity management
  2. Federations and virtual organizations
  3. Applied cryptography
  4. Information cards
  5. Usability

Identity management

Identity, credential, and access management at NASA, from Zachman to attributes BIBAKFull-Text 1-14
  Corinne S. Irwin; Dennis C. Taylor
Personal identity verification (PIV) cards as federated identities: challenges and opportunities BIBAKFull-Text 15-22
  Sarbari Gupta
A calculus of trust and its application to PKI and identity management BIBAKFull-Text 23-37
  Jingwei Huang; David Nicol

Federations and virtual organizations

Palantir: a framework for collaborative incident response and investigation BIBAKFull-Text 38-51
  Himanshu Khurana; Jim Basney; Mehedi Bakht; Mike Freemon; Von Welch; Randy Butler
Safeguarding digital identity: the SPICI (Sharing Policy, Identity, and Control Information) approach to negotiating identity federation and sharing agreements BIBAKFull-Text 52-60
  Deborah Bodeau
Usable trust anchor management BIBAKFull-Text 61-72
  Massimiliano Pala; Scott A. Rea

Applied cryptography

Privacy-preserving management of transactions' receipts for mobile environments BIBAKFull-Text 73-84
  Federica Paci; Ning Shang; Sam Kerr; Kevin, Jr. Steuer; Jungha Woo; Elisa Bertino
Quantum resistant public key cryptography: a survey BIBAKFull-Text 85-93
  Ray A. Perlner; David A. Cooper

Information cards

FileSpace: an alternative to CardSpace that supports multiple token authorisation and portability between devices BIBAKFull-Text 94-102
  David Chadwick

Usability

Usable secure mailing lists with untrusted servers BIBAKFull-Text 103-116
  Rakesh Bobba; Joe Muggli; Meenal Pant; Jim Basney; Himanshu Khurana