National Strategy for Trusted Identities in Cyberspace
Semantic Scholar uses AI to extract papers important to this topic.
Identity management systems store attributes associated with users and employ these attributes to facilitate authorization. The… Expand Many European states have issued electronic identities (eID) to its citizens since the early 2000s. Several have reached full… Expand Large-scale personal data has become the new oil of the Internet. However, personal data tend to be monopolized and siloed by… Expand The National Strategy for Trusted Identities in Cyberspace (NSTIC) is a proposal by the Obama administration to create secure… Expand Password-centric attacks are increasingly common, and reliance on weak password technology has been a growing attack vector that… Expand There has been much academic discussion of federated authentication, and quite some political manoeuvring about ‘e-ID'. The grand… Expand As a result of potential damage to our national infrastructure due to cyber attacks, a number of cyber-security bills have been… Expand Federated identity management (FIM) enables a user to authenticate once and access privileged information across disparate… Expand OK, so the talk that I've got today is entitled "Can We Fix the Security Economics of Federated Authentication?" and some of this… Expand