Squicciarini et al. - Google Patents
Integrating Federated Digital Identity Management and Trust Negotiation–issues and solutionsSquicciarini et al.
View PDF- Document ID
- 4705043779905456725
- Author
- Squicciarini A
- Bertino E
External Links
Snippet
Most organizations today require the verification of personal information pertaining to users in order to provide service to users. Privacy of such information is of growing concern and because organizations often ask for similar information, this process can also be redundant …
- 238000000034 method 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6254—Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99939—Privileged access
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99931—Database or file accessing
- Y10S707/99933—Query processing, i.e. searching
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bhargav-Spantzel et al. | Trust negotiation in identity management | |
| US10333941B2 (en) | Secure identity federation for non-federated systems | |
| KR100920871B1 (en) | Methods and systems for authentication of a user for sub-locations of a network location | |
| Basney et al. | Negotiating trust on the grid | |
| Bazaz et al. | A review on single sign on enabling technologies and protocols | |
| Fotiou et al. | Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials | |
| Pérez-Méndez et al. | Identity federations beyond the web: A survey | |
| Schaffner | Analysis and evaluation of blockchain-based self-sovereign identity systems | |
| Lee et al. | Traust: a trust negotiation-based authorization service for open systems | |
| Bichsel et al. | An architecture for privacy-ABCs | |
| Marillonnet et al. | An Efficient User‐Centric Consent Management Design for Multiservices Platforms | |
| Bhargav-Spantzel et al. | Integrating federated digital identity management and trust negotiation | |
| Ahn et al. | Information assurance in federated identity management: Experimentations and issues | |
| Squicciarini et al. | Integrating Federated Digital Identity Management and Trust Negotiation–issues and solutions | |
| Pärni | On Self-Sovereign Identity: Verifiable Credentials and Presentations with OpenID Connect | |
| Bertino et al. | Digital identity management and trust negotiation | |
| Anna | Trust Negotiation in Identity Management | |
| Papanchev | An Interoperable Access Control System Based on Self-sovereign Identities | |
| KR101066729B1 (en) | Method and system for user authentication of sub-location of network location | |
| Heikkinen | Identity management | |
| Bussard et al. | Can we take this off-line? how to deal with credentials in federations without global connectivity | |
| Cordova Morales et al. | Enhancing the Acme Protocol to Automate the Management of All X. 509 Web Certificates (Extended Version) | |
| Semančík | Revised World Wide Web Architecture | |
| Bussard et al. | Can we take this off-line? | |
| de Oliveira Pimenta | Identidade Digital Federada Globalid |