Curie - Google Patents
IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online servicesCurie
View PDF- Document ID
- 7169948084532773738
- Author
- Curie M
External Links
Snippet
The current deliverable documents the reference architecture of the INCOGNITO project and is part of the Work Package 2. The development of the project is taking place under a partnership that involves both academic and industrial expertise. Considering the …
- 238000000034 method 0 abstract description 62
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/33—User authentication using certificates
- G06F21/335—User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0815—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0892—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network by using authentication-authorization-accounting [AAA] servers or protocols
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Lux et al. | Distributed-ledger-based authentication with decentralized identifiers and verifiable credentials | |
JP7083892B2 (en) | Mobile authentication interoperability of digital certificates | |
US9300653B1 (en) | Delivery of authentication information to a RESTful service using token validation scheme | |
Carretero et al. | Federated identity architecture of the European eID system | |
Laborde et al. | A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework | |
Berbecaru et al. | Providing login and Wi-Fi access services with the eIDAS network: A practical approach | |
Alonso et al. | An identity framework for providing access to FIWARE OAuth 2.0-based services according to the eIDAS European regulation | |
Yildiz et al. | Connecting self-sovereign identity with federated and user-centric identities via SAML integration | |
TW201141176A (en) | Method and apparatus for providing trusted single sing-on access to applications and internet-based services | |
Pérez-Méndez et al. | Identity federations beyond the web: A survey | |
Kiourtis et al. | Identity management standards: a literature review | |
Ribeiro de Mello et al. | Multi-factor authentication for shibboleth identity providers | |
Singh et al. | Identity management in cloud computing through claim-based solution | |
Catuogno et al. | Achieving interoperability between federated identity management systems: A case of study | |
van den Broek et al. | Securely derived identity credentials on smart phones via self-enrolment | |
Baker | OAuth2 | |
Vanella | Evolution of Digital Identity in Europe: Experimenting with the eIDAS 2.0 Framework and the EU Digital Identity Wallet | |
Zwattendorfer et al. | Middleware architecture for cross-border identification and authentication | |
Li | Context-aware attribute-based techniques for data security and access control in mobile cloud environment | |
Hauck | OpenID for Verifiable Credentials: formal security analysis using the Web Infrastructure Model | |
Al-Sinani et al. | Client-based cardspace-openid interoperation | |
Curie | IdeNtity verifiCatiOn with privacy-preservinG credeNtIals for anonymous access To Online services | |
Mourya | Implementing an IDaaS for Azure Active Directory using Azure Conditional Access Policies | |
Paul et al. | UI Component and Authentication | |
Keil | Social Security |