Lecture Notes in Informatics
Open Identity Summit 2013
Gesellschaft für Informatik, Bonn
2013
Editors
Detlef Hühnlein (ed.), Heiko Roßnagel (ed.)
Copyright © Gesellschaft für Informatik, Bonn
Contents
Articles
- Maximilian Stein
Mobile devices as secure eid reader using trusted execution environments
Pages: 11-19... Full Text
- Roland Van Rijswijk-Deij, Erik Poll
Using Trusted Execution Environments in Two-factor Authentication: comparing approaches
Pages: 20-31... Full Text
- Simon Thiel, Fabian Hermann, Marcel Heupel, Mohamed Bourimi
Unlinkability support in a decentralised, multiple-identity social network
Pages: 32-42... Full Text
- Bernd Zwattendorfer, Bojan Suzic, Peter Teufl, Andreas Derler
Secure Hardware-Based Public Cloud Storage
Pages: 43-54... Full Text
- Tobias Wich, Moritz Horsch, Dirk Petrautzki, Johannes Schmölz, Detlef Hühnlein, Thomas Wieland, Simon Potzernheim
An extensible client platform for eid, signatures and more
Pages: 55-68... Full Text
- Michael Kubach, Heiko Roßnagel, Rachelle Sellung
Service providers' requirements for eid solutions: empirical evidence from the leisure sector
Pages: 69-81... Full Text
- Raik Kuhlisch, Dirk Petrautzki, Johannes Schmölz, Ben Kraufmann, Florian Thiemer, Tobias Wich, Detlef Hühnlein, Thomas Wieland
An open ecard plug-in for accessing the German national personal health record
Pages: 82-93... Full Text
- Thomas Bauereiss, Stefan Gohmann, Dieter Hutter, Alexander Kläser
Selective LDAP Multi-Master Replication
Pages: 94-105... Full Text
- Florian Holzschuher, René Peinl
Approaches and challenges for a single sign-on enabled extranet using jasig CAS.
Pages: 106-117... Full Text
- Stephan Sädtler
Identity management in cloud computing in conformity with European union law? -- problems and approaches pursuant to the proposal for a regulation by the European commission on electronic identification and trust services for electronic transactions in the internal market
Pages: 118-129... Full Text
- Florian Feldmann, Jörg Schwenk
How to authenticate mobile devices in a web environment -- the SIM-ID approach
Pages: 130-141... Full Text
- Martina Müller, Fabian Zoller, Ingo Pansa, Ansgar Gerlicher
Authentication on mobile devices for business application
Pages: 142-154... Full Text
- Tomas Gustavsson
Common Criteria certified open source software -- fact or fiction?
Pages: 155-155... Full Text
- Bud P. Bruegger, Moritz-Christian Müller
The eid-terminology work of futureid
Pages: 156-162... Full Text
- Detlef Houdeau
Landscape eID in Europe in CY2013
Pages: 163-163... Full Text
- Rolf Lindemann
Not built on sand -- how modern authentication complements federation
Pages: 164-168... Full Text
- Holger Funke, Tobias Senger
An open source eID simulator
Pages: 169-169... Full Text
- Armin Lunkeit, Jürgen Großmann
Authentication on high critical infrastructures using interoperable federated identities
Pages: 170-177... Full Text
- Menno Pieters
Password Management through PWM
Pages: 178-178... Full Text
- Hermann Strack
Authentication and security integration for ecampus services at the university of applied sciences harz using the German electronic identity card/eid and egovernment standards
Pages: 179-181... Full Text
- Marcel Selhorst, Carsten Schwarz
Cloud-based provisioning of qualified certificates for the German ID card
Pages: 182-182... Full Text
- Henrik Biering, Axel Nennker
Upcoming specifications from the openid foundation
Pages: 183-186... Full Text
- Hubert Jäger, Arnold Monitzer, Ralf Rieken, Edmund Ernst
A novel set of measures against insider attacks -- sealed cloud
Pages: 187-197... Full Text
Gesellschaft für Informatik, Bonn
ISBN 978-3-88579-617-6
Last changed 12.03.2014 15:23:35