[go: up one dir, main page]

Malik et al., 2015 - Google Patents

Federated identity management (FIM): Challenges and opportunities

Malik et al., 2015

Document ID
13859299799114273402
Author
Malik A
Anwar H
Shibli M
Publication year
Publication venue
2015 Conference on Information Assurance and Cyber Security (CIACS)

External Links

Snippet

Federated Identity Management (FIM) is a method that facilitates management of identity processes and policies among the collaborating entities. It also enables secure resource sharing among these entities, but it hasn't been as widely adopted as expected. So, in this …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US10958662B1 (en) Access proxy platform
US11134058B1 (en) Network traffic inspection
Lim et al. Blockchain technology the identity management and authentication service disruptor: a survey
US11457040B1 (en) Reverse TCP/IP stack
Malik et al. Federated identity management (FIM): Challenges and opportunities
Zhong et al. Distributed blockchain‐based authentication and authorization protocol for smart grid
Kim et al. A security analysis of blockchain-based did services
Khattak et al. A study on threat model for federated identities in federated identity management system
CN105681470A (en) Communication method, server and terminal based on hypertext transfer protocol
Alhaidary et al. Vulnerability analysis for the authentication protocols in trusted computing platforms and a proposed enhancement of the offpad protocol
Anand et al. Identity and access management systems
Pu et al. liteGAP: Lightweight group authentication protocol for internet of drones systems
Ghazizadeh et al. A trust based model for federated identity architecture to mitigate identity theft
Singh et al. Revisiting cloud security threats: Replay attack
Weingärtner et al. A design towards personally identifiable information control and awareness in OpenID Connect identity providers
Syros et al. Saga: A security architecture for governing ai agentic systems
Otta et al. Cloud identity and access management solution with blockchain
CN115051848B (en) A blockchain-based identity authentication method
Ashraf et al. Authentication in IoT devices using blockchain technology: A review
Tiwari et al. Design and Implementation of Enhanced Security Algorithm for Hybrid Cloud using Kerberos
Beuchelt Securing Web applications, services, and servers
Brooks et al. Conceptualizing a secure wireless cloud
Zerraza et al. An Efficient Lightweight Authentication and Access Control for IoT Edge Devices.
Binu et al. A mobile based remote user authentication scheme without verifier table for cloud based services
Algaradi et al. Big data security: a progress study of current user authentication schemes