[go: up one dir, main page]

Chadwick et al., 2010 - Google Patents

A conceptual model for attribute aggregation

Chadwick et al., 2010

View PDF
Document ID
12169122857802074566
Author
Chadwick D
Inman G
Klingenstein N
Publication year
Publication venue
Future Generation Computer Systems

External Links

Snippet

This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user's access request based on attributes asserted by multiple identity providers (IdPs), when the user is known by different identities at each of the IdPs …
Continue reading at www.cs.kent.ac.uk (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • H04L63/0815Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network providing single-sign-on or federations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/30Network-specific arrangements or communication protocols supporting networked applications involving profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/28Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network
    • H04L67/2804Network-specific arrangements or communication protocols supporting networked applications for the provision of proxy services, e.g. intermediate processing or storage in the network for adding application control or application functional data, e.g. adding metadata

Similar Documents

Publication Publication Date Title
Lopez et al. Authentication and authorization infrastructures (AAIs): a comparative survey
US7610390B2 (en) Distributed network identity
Werner et al. Cloud identity management: A survey on privacy strategies
Fischer-Hbner et al. Privacy-enhancing technologies
Bernstein et al. Intercloud security considerations
Chadwick et al. Attribute aggregation in federated identity management
KR20090068183A (en) Self-registration enhanced digital identity sharing device and method
US20240250931A1 (en) A method for managing a digital identity
Chadwick et al. A conceptual model for attribute aggregation
Chadwick et al. The trusted attribute aggregation service (TAAS)-providing an attribute aggregation layer for federated identity management
Taylor et al. Implementing role based access control for federated information systems on the web
Chadwick Authorisation using attributes from multiple authorities
Gomi Dynamic identity delegation using access tokens in federated environments
Augusto et al. OFELIA–A secure mobile attribute aggregation infrastructure for user-centric identity management
Yeh et al. Applying lightweight directory access protocol service on session certification authority
Papastergiou et al. A federated privacy-enhancing identity management system (FPE-IMS)
US7747850B1 (en) Automated, internet-based secure digital certificate distribution and maintenance
Ferdous et al. A hybrid model of attribute aggregation in federated identity management
Laborde et al. A secure collaborative web-based environment for virtual organisations
Vullings et al. Secure federated authentication and authorisation to grid portal applications using saml and xacml
Nasim Privacy-enhancing access control mechanism in distributed online social network
Inman et al. A privacy preserving attribute aggregation model for federated identity managements systems
Vullings et al. Secure Federated Access to GRID applications using SAML/XACML
Pimenidis et al. Web services security evaluation considerations
Huebner et al. The CONVERGENCE Security Infrastructure