[go: up one dir, main page]

Erdos et al., 2002 - Google Patents

Shibboleth architecture draft v05

Erdos et al., 2002

View PDF
Document ID
17149915262421308331
Author
Erdos M
Cantor S
Publication year
Publication venue
Internet2/MACE, May

External Links

Snippet

Shibboleth, an Internet2/MACE project with intellectual and financial support from IBM, is developing architectures, frameworks, and practical technologies to support inter- institutional sharing of resources that are subject to access controls. This paper presents the …
Continue reading at shibboleth.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Similar Documents

Publication Publication Date Title
Erdos et al. Shibboleth architecture draft v05
US7926089B2 (en) Router for managing trust relationships
US6691232B1 (en) Security architecture with environment sensitive credential sufficiency evaluation
US6668322B1 (en) Access management system and method employing secure credentials
US6609198B1 (en) Log-on service providing credential level change without loss of session continuity
US6892307B1 (en) Single sign-on framework with trust-level mapping to authentication requirements
TWI400922B (en) Authentication of a principal in a federation
US7774612B1 (en) Method and system for single signon for multiple remote sites of a computer network
US8108920B2 (en) Passive client single sign-on for web applications
US9514459B1 (en) Identity broker tools and techniques for use with forward proxy computers
US7860882B2 (en) Method and system for distributed retrieval of data objects using tagged artifacts within federated protocol operations
Laborde et al. A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework
US7240362B2 (en) Providing identity-related information and preventing man-in-the-middle attacks
US20040054898A1 (en) Authenticating and communicating verifiable authorization between disparate network domains
JP2005538434A (en) Method and system for user-based authentication in a federated environment
JP4932154B2 (en) Method and system for providing user authentication to a member site in an identity management network, method for authenticating a user at a home site belonging to the identity management network, computer readable medium, and system for hierarchical distributed identity management
US9009799B2 (en) Secure access
Chandersekaran et al. Claims-based enterprise-wide access control
Chadwick et al. Leveraging social networks to gain access to organisational resources
Karunanithi et al. Single sign-on and single log out in identity
Erdos et al. Shibboleth-Architecture DRAFT v03
Zhuravel Enhancing Website Security: A Comparative Study of OAuth, SAML, and their Integration into HelpMe Office Hours System
Bertino et al. Digital identity management and trust negotiation
Peldius Security Architecture for Web Services
Bhatti et al. Evaluation of different Open Source Identity management Systems