Erdos et al., 2002 - Google Patents
Shibboleth architecture draft v05Erdos et al., 2002
View PDF- Document ID
- 17149915262421308331
- Author
- Erdos M
- Cantor S
- Publication year
- Publication venue
- Internet2/MACE, May
External Links
Snippet
Shibboleth, an Internet2/MACE project with intellectual and financial support from IBM, is developing architectures, frameworks, and practical technologies to support inter- institutional sharing of resources that are subject to access controls. This paper presents the …
- 230000003993 interaction 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogramme communication; Intertask communication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Erdos et al. | Shibboleth architecture draft v05 | |
US7926089B2 (en) | Router for managing trust relationships | |
US6691232B1 (en) | Security architecture with environment sensitive credential sufficiency evaluation | |
US6668322B1 (en) | Access management system and method employing secure credentials | |
US6609198B1 (en) | Log-on service providing credential level change without loss of session continuity | |
US6892307B1 (en) | Single sign-on framework with trust-level mapping to authentication requirements | |
TWI400922B (en) | Authentication of a principal in a federation | |
US7774612B1 (en) | Method and system for single signon for multiple remote sites of a computer network | |
US8108920B2 (en) | Passive client single sign-on for web applications | |
US9514459B1 (en) | Identity broker tools and techniques for use with forward proxy computers | |
US7860882B2 (en) | Method and system for distributed retrieval of data objects using tagged artifacts within federated protocol operations | |
Laborde et al. | A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework | |
US7240362B2 (en) | Providing identity-related information and preventing man-in-the-middle attacks | |
US20040054898A1 (en) | Authenticating and communicating verifiable authorization between disparate network domains | |
JP2005538434A (en) | Method and system for user-based authentication in a federated environment | |
JP4932154B2 (en) | Method and system for providing user authentication to a member site in an identity management network, method for authenticating a user at a home site belonging to the identity management network, computer readable medium, and system for hierarchical distributed identity management | |
US9009799B2 (en) | Secure access | |
Chandersekaran et al. | Claims-based enterprise-wide access control | |
Chadwick et al. | Leveraging social networks to gain access to organisational resources | |
Karunanithi et al. | Single sign-on and single log out in identity | |
Erdos et al. | Shibboleth-Architecture DRAFT v03 | |
Zhuravel | Enhancing Website Security: A Comparative Study of OAuth, SAML, and their Integration into HelpMe Office Hours System | |
Bertino et al. | Digital identity management and trust negotiation | |
Peldius | Security Architecture for Web Services | |
Bhatti et al. | Evaluation of different Open Source Identity management Systems |