Al-Sinani et al., 2011 - Google Patents
Client-based cardspace-openid interoperationAl-Sinani et al., 2011
View PDF- Document ID
- 5776405571072883396
- Author
- Al-Sinani H
- Mitchell C
- Publication year
- Publication venue
- Computer and Information Sciences II: 26th International Symposium on Computer and Information Sciences
External Links
Snippet
We propose a novel scheme to provide interoperability between two of the most widely discussed identity management systems, namely CardSpace and OpenID. In this scheme, CardSpace users are able to obtain an assertion token from an OpenID-enabled identity …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2115—Third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10333941B2 (en) | Secure identity federation for non-federated systems | |
JP7083892B2 (en) | Mobile authentication interoperability of digital certificates | |
Carretero et al. | Federated identity architecture of the European eID system | |
US8220035B1 (en) | System and method for trusted embedded user interface for authentication | |
US8353016B1 (en) | Secure portable store for security skins and authentication information | |
Bichsel et al. | An architecture for privacy-ABCs | |
Ribeiro de Mello et al. | Multi-factor authentication for shibboleth identity providers | |
Buccafurri et al. | Enhancing public digital identity system (SPID) to prevent information leakage | |
Pöhn et al. | New directions and challenges within identity and access management | |
Abubakar-Sadiq | Establishing secure and privacy preserving digital identity with self-sovereign identity | |
Al-Sinani et al. | Client-based cardspace-openid interoperation | |
Shaikh et al. | Identity management in cloud computing | |
Al-Sinani et al. | CardSpace-Liberty integration for CardSpace users | |
Vanella | Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet | |
Wild et al. | Proprotect3: An approach for protecting user profile data from disclosure, tampering, and improper use in the context of webid | |
James | Web single sign-on systems | |
Al-Sinani | Integrating OAuth with information card systems | |
Al‐Sinani et al. | Enabling interoperation between Shibboleth and Information Card systems | |
Klingelbrunner | Datenschutz in SSI Systemen basierend auf Hyperledger Technologie | |
Al-Sinani et al. | Client-based CardSpace-Shibboleth interoperation | |
Kyrillidis et al. | A smart card web server in the web of things | |
Modi et al. | An Enhance Mechanism for Secure Data Sharing with Identity Management in Cloud Computing | |
Sumitra et al. | Safe Cloud: Secure and Usable Authentication Framework for Cloud Environment | |
Al-Sinani et al. | CardSpace-Shibboleth integration for CardSpace users | |
Carretero Pérez et al. | Federated identity architecture of the european eID system |