[go: up one dir, main page]

Buecker et al., 2005 - Google Patents

Federated Identity Management and Web Services Security

Buecker et al., 2005

View PDF
Document ID
1008631496280942290
Author
Buecker A
Filip W
Hinton H
Hippenstiel H
Hollin M
Neucom R
Weeden S
Westman J
Publication year
Publication venue
IBM Redbook

External Links

Snippet

This IBM Redbook discusses the federated identity management (FIM) architecture and the integration with Web services security standards and IBM Tivoli® Security Solutions. In a federated environment, a user can log on through his identity provider in order to conduct …
Continue reading at book.huihoo.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0807Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions

Similar Documents

Publication Publication Date Title
US10810515B2 (en) Digital rights management (DRM)-enabled policy management for an identity provider in a federated environment
EP1461718B1 (en) Distributed network identity
US8196177B2 (en) Digital rights management (DRM)-enabled policy management for a service provider in a federated environment
US20050114701A1 (en) Federated identity management within a distributed portal server
TW200821890A (en) Method and system for policy-based initiation of federation management
US20130145419A1 (en) Systems and Methods for Generating Trust Federation Data from BPMN Choreography
Demchenko Virtual organisations in computer grids and identity management
Watt et al. Federated authentication and authorisation in the social science domain
Buecker et al. Federated Identity Management and Web Services Security
Wilson et al. SAML 2
Landau et al. Achieving privacy in a federated identity management system
Barnett et al. A roadmap for using NSF cyberinfrastructure with InCommon
Gupta et al. Dimensions of identity federation: A case study in financial services
Hu Derivation of trust federation for collaborative business processes
Sinnott et al. Architectural design patterns for security-oriented workflows in the social science domain
Müller Security Mechanisms for Workflows in Service-Oriented Architectures
Oltsik Services-oriented architecture (soa) and federated identity management (fim)
Archer et al. Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture
Gemmill A trust-relationship management framework for federated virtual organizations
Hu et al. Business-driven trust federation management for service marketplaces
Perkola Identity and access management with a CIAM solution: case Azure Active Directory Business to Customer
Al-Hajri Enhanced e-government integration framework for building efficient e-government integration portals
Alemayehu et al. An Interoperable Identity Management Solution for Kenya E-Government
Hämäläinen Centralized Identity Management for Web Applications
Jablonski et al. Organizations and Organizational Structures