What user-controlled identity management should learn from communities. Borcea-Pfitzmann, K., Hansen, M., Liesebach, K., Steinbrecher, S., & Pfitzmann, A. Information Security Technical Report, 11(3):119-128, 2006. bibtex @article{borceapfitzmann.150,
author = {Borcea-Pfitzmann, Katrin and Hansen, Marit and Liesebach, Katja and Steinbrecher, Sandra and Pfitzmann, Andreas},
title = {What user-controlled identity management should learn from communities},
volume = {11},
number = {3},
year = {2006},
journal = {Information Security Technical Report},
pages = {119-128},
}
Downloads: 0
{"_id":"yhPCiAEsSCfGR2C2L","bibbaseid":"borceapfitzmann-hansen-liesebach-steinbrecher-pfitzmann-whatusercontrolledidentitymanagementshouldlearnfromcommunities-2006","downloads":0,"creationDate":"2015-10-14T12:51:36.194Z","title":"What user-controlled identity management should learn from communities","author_short":["Borcea-Pfitzmann, K.","Hansen, M.","Liesebach, K.","Steinbrecher, S.","Pfitzmann, A."],"year":2006,"bibtype":"article","biburl":"http://tu-dresden.de/die_tu_dresden/fakultaeten/fakultaet_informatik/sysa/ps/forschung/p2p_dud.bib","bibdata":{"bibtype":"article","type":"article","author":[{"propositions":[],"lastnames":["Borcea-Pfitzmann"],"firstnames":["Katrin"],"suffixes":[]},{"propositions":[],"lastnames":["Hansen"],"firstnames":["Marit"],"suffixes":[]},{"propositions":[],"lastnames":["Liesebach"],"firstnames":["Katja"],"suffixes":[]},{"propositions":[],"lastnames":["Steinbrecher"],"firstnames":["Sandra"],"suffixes":[]},{"propositions":[],"lastnames":["Pfitzmann"],"firstnames":["Andreas"],"suffixes":[]}],"title":"What user-controlled identity management should learn from communities","volume":"11","number":"3","year":"2006","journal":"Information Security Technical Report","pages":"119-128","bibtex":"@article{borceapfitzmann.150,\n\tauthor = {Borcea-Pfitzmann, Katrin and Hansen, Marit and Liesebach, Katja and Steinbrecher, Sandra and Pfitzmann, Andreas},\n\ttitle = {What user-controlled identity management should learn from communities},\n\tvolume = {11},\n\tnumber = {3},\n\tyear = {2006},\n\tjournal = {Information Security Technical Report},\n\tpages = {119-128},\n}\n\n","author_short":["Borcea-Pfitzmann, K.","Hansen, M.","Liesebach, K.","Steinbrecher, S.","Pfitzmann, A."],"key":"borceapfitzmann.150","id":"borceapfitzmann.150","bibbaseid":"borceapfitzmann-hansen-liesebach-steinbrecher-pfitzmann-whatusercontrolledidentitymanagementshouldlearnfromcommunities-2006","role":"author","urls":{},"downloads":0,"html":""},"search_terms":["user","controlled","identity","management","learn","communities","borcea-pfitzmann","hansen","liesebach","steinbrecher","pfitzmann"],"keywords":[],"authorIDs":[],"dataSources":["kReEe5z7kDR8Gn2Jp"]}