Malik et al., 2015 - Google Patents
Federated identity management (FIM): Challenges and opportunitiesMalik et al., 2015
- Document ID
- 13859299799114273402
- Author
- Malik A
- Anwar H
- Shibli M
- Publication year
- Publication venue
- 2015 Conference on Information Assurance and Cyber Security (CIACS)
External Links
Snippet
Federated Identity Management (FIM) is a method that facilitates management of identity processes and policies among the collaborating entities. It also enables secure resource sharing among these entities, but it hasn't been as widely adopted as expected. So, in this …
- 238000000034 method 0 abstract description 25
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10958662B1 (en) | Access proxy platform | |
| US11134058B1 (en) | Network traffic inspection | |
| Lim et al. | Blockchain technology the identity management and authentication service disruptor: a survey | |
| US11457040B1 (en) | Reverse TCP/IP stack | |
| Malik et al. | Federated identity management (FIM): Challenges and opportunities | |
| Zhong et al. | Distributed blockchain‐based authentication and authorization protocol for smart grid | |
| Kim et al. | A security analysis of blockchain-based did services | |
| Khattak et al. | A study on threat model for federated identities in federated identity management system | |
| CN105681470A (en) | Communication method, server and terminal based on hypertext transfer protocol | |
| Alhaidary et al. | Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol | |
| Anand et al. | Identity and access management systems | |
| Pu et al. | liteGAP: Lightweight group authentication protocol for internet of drones systems | |
| Ghazizadeh et al. | A trust based model for federated identity architecture to mitigate identity theft | |
| Singh et al. | Revisiting cloud security threats: Replay attack | |
| Weingärtner et al. | A design towards personally identifiable information control and awareness in OpenID Connect identity providers | |
| Syros et al. | Saga: A security architecture for governing ai agentic systems | |
| Otta et al. | Cloud identity and access management solution with blockchain | |
| CN115051848B (en) | A blockchain-based identity authentication method | |
| Ashraf et al. | Authentication in IoT devices using blockchain technology: A review | |
| Tiwari et al. | Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos | |
| Beuchelt | Securing Web applications, services, and servers | |
| Brooks et al. | Conceptualizing a secure wireless cloud | |
| Zerraza et al. | An Efficient Lightweight Authentication and Access Control for IoT Edge Devices. | |
| Binu et al. | A mobile based remote user authentication scheme without verifier table for cloud based services | |
| Algaradi et al. | Big data security: a progress study of current user authentication schemes |