Ivonne Thomas

According to our database1, Ivonne Thomas authored at least 14 papers between 2007 and 2011.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2011
An Attribute Assurance Framework to Define and Match Trust in Identity Attributes.
Proceedings of the IEEE International Conference on Web Services, 2011

Whom to Trust? Generating WS-Security Policies Based on Assurance Information.
Proceedings of the 9th IEEE European Conference on Web Services, 2011

2010
The Service Security Lab: A Model-Driven Platform to Compose and Explore Service Security in the Cloud.
Proceedings of the 6th World Congress on Services, 2010

An identity provider to manage reliable digital identities for SOA and the web.
Proceedings of the 9th Symposium on Identity and Trust on the Internet, 2010

Reliable Digital Identities for SOA and the Web.
Proceedings of the Joint Workshop of the German Research Training Groups in Computer Science, 2010

2009
A message meta model for federated authentication in service-oriented architectures.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

Security Requirements Specification in Process-aware Information Systems.
Proceedings of the ISSE 2009, 2009

A Web Service Architecture for Decentralised Identity- and Attribute-Based Access Control.
Proceedings of the IEEE International Conference on Web Services, 2009

Trust Requirements in Identity Federation Topologies.
Proceedings of the IEEE 23rd International Conference on Advanced Information Networking and Applications, 2009

Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims.
Proceedings of the 2009 IEEE International Conference on Services Computing (SCC 2009), 2009

Security Requirements Specification in Service-Oriented Business Process Management.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Using quantified trust levels to describe authentication requirements in federated identity management.
Proceedings of the 5th ACM Workshop On Secure Web Services, 2008

Quantified Trust Levels for Authentication.
Proceedings of the ISSE 2008, 2008

2007
Towards User Authentication Flexibility.
Proceedings of the SECRYPT 2007, 2007


  Loading...