Abstract is missing.
- A client-side CardSpace-Liberty integration architectureWaleed A. Alrodhan, Chris J. Mitchell. 1-7 [doi]
- Identity protection factor (IPF)Arshad Noor. 8-18 [doi]
- OpenID identity discovery with XRI and XRDSDrummond Reed, Les Chasen, William Tan. 19-25 [doi]
- A content-driven access control systemJessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen. 26-35 [doi]
- Secure roaming with identity metasystemsLong Nguyen Hoang, Pekka Laitinen, N. Asokan. 36-47 [doi]
- Secure communication for ad-hoc, federated groupsAndreas Sjöholm, Ludwig Seitz, Babak Sadighi. 48-58 [doi]
- User-centric PKIRadia J. Perlman, Charlie Kaufman. 59-71 [doi]
- Public key superstructure it s PKI Jim, but not as we know it! Stephen Wilson. 72-88 [doi]
- Audit and backup procedures for hardware security modulesTúlio Cicero Salvaro de Souza, Jean Everson Martina, Ricardo Felipe Custódio. 89-97 [doi]
- Securing the core with an Enterprise Key Management Infrastructure (EKMI)Arshad Noor. 98-111 [doi]
- A federation of web services for Danish health careEsben Dalsgaard, Kåre Kjelstrøm, Jan Riis. 112-121 [doi]
- Security and privacy system architecture for an e-hospital environmentKathryn Garson, Carlisle Adams. 122-130 [doi]