[go: up one dir, main page]

Bhargav-Spantzel et al., 2007 - Google Patents

Trust negotiation in identity management

Bhargav-Spantzel et al., 2007

Document ID
17534596591545640037
Author
Bhargav-Spantzel A
Squicciarini A
Bertino E
Publication year
Publication venue
IEEE Security & Privacy

External Links

Snippet

Most organizations require the verification of personal information before providing services, and the privacy of such information is of growing concern. The authors show how federated identity management systems can better protect users' information when integrated with trust …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Bhargav-Spantzel et al. Trust negotiation in identity management
US10333941B2 (en) Secure identity federation for non-federated systems
US7299493B1 (en) Techniques for dynamically establishing and managing authentication and trust relationships
EP1461718B1 (en) Distributed network identity
US8966568B2 (en) Method and device for data processing and communication system comprising such device
EP1560394B1 (en) Techniques for dynamically establishing and managing authentication and trust relationships
Koshutanski et al. Distributed identity management model for digital ecosystems
Lee et al. Traust: a trust negotiation-based authorization service for open systems
Bichsel et al. An architecture for privacy-ABCs
Marillonnet et al. An Efficient User‐Centric Consent Management Design for Multiservices Platforms
Shaikh et al. Identity management in cloud computing
Bhargav-Spantzel et al. Integrating federated digital identity management and trust negotiation
Put et al. Attribute-based privacy-friendly access control with context
Monga et al. An OAuth-based authentication mechanism for open messaging interface standard
Anna Trust Negotiation in Identity Management
Camposo Securing web services with keycloak
Biennier Web Single Sign On and SAML
Bertino et al. Digital identity management and trust negotiation
Squicciarini et al. Integrating Federated Digital Identity Management and Trust Negotiation–issues and solutions
Marillonnet et al. Research Article An Efficient User-Centric Consent Management Design for Multiservices Platforms
Papanchev An Interoperable Access Control System Based on Self-sovereign Identities
Sharma et al. UDDI and SAML based framework for Secure Semantic Web Services.
NATH PANDEY Secure IDMS for Cloud Computing Environment
Semančík Revised World Wide Web Architecture
Heikkinen Identity management