Buecker et al., 2005 - Google Patents
Federated Identity Management and Web Services SecurityBuecker et al., 2005
View PDF- Document ID
- 1008631496280942290
- Author
- Buecker A
- Filip W
- Hinton H
- Hippenstiel H
- Hollin M
- Neucom R
- Weeden S
- Westman J
- Publication year
- Publication venue
- IBM Redbook
External Links
Snippet
This IBM Redbook discusses the federated identity management (FIM) architecture and the integration with Web services security standards and IBM Tivoli® Security Solutions. In a federated environment, a user can log on through his identity provider in order to conduct …
- 238000005538 encapsulation 0 abstract description 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
- H04L63/0807—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network using tickets, e.g. Kerberos
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/102—Entity profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10810515B2 (en) | Digital rights management (DRM)-enabled policy management for an identity provider in a federated environment | |
EP1461718B1 (en) | Distributed network identity | |
US8196177B2 (en) | Digital rights management (DRM)-enabled policy management for a service provider in a federated environment | |
US20050114701A1 (en) | Federated identity management within a distributed portal server | |
TW200821890A (en) | Method and system for policy-based initiation of federation management | |
US20130145419A1 (en) | Systems and Methods for Generating Trust Federation Data from BPMN Choreography | |
Demchenko | Virtual organisations in computer grids and identity management | |
Watt et al. | Federated authentication and authorisation in the social science domain | |
Buecker et al. | Federated Identity Management and Web Services Security | |
Wilson et al. | SAML 2 | |
Landau et al. | Achieving privacy in a federated identity management system | |
Barnett et al. | A roadmap for using NSF cyberinfrastructure with InCommon | |
Gupta et al. | Dimensions of identity federation: A case study in financial services | |
Hu | Derivation of trust federation for collaborative business processes | |
Sinnott et al. | Architectural design patterns for security-oriented workflows in the social science domain | |
Müller | Security Mechanisms for Workflows in Service-Oriented Architectures | |
Oltsik | Services-oriented architecture (soa) and federated identity management (fim) | |
Archer et al. | Cloud Native Data Security with OAuth: A Scalable Zero Trust Architecture | |
Gemmill | A trust-relationship management framework for federated virtual organizations | |
Hu et al. | Business-driven trust federation management for service marketplaces | |
Perkola | Identity and access management with a CIAM solution: case Azure Active Directory Business to Customer | |
Al-Hajri | Enhanced e-government integration framework for building efficient e-government integration portals | |
Alemayehu et al. | An Interoperable Identity Management Solution for Kenya E-Government | |
Hämäläinen | Centralized Identity Management for Web Applications | |
Jablonski et al. | Organizations and Organizational Structures |