Bhargav-Spantzel et al., 2007 - Google Patents
Trust negotiation in identity managementBhargav-Spantzel et al., 2007
- Document ID
- 17534596591545640037
- Author
- Bhargav-Spantzel A
- Squicciarini A
- Bertino E
- Publication year
- Publication venue
- IEEE Security & Privacy
External Links
Snippet
Most organizations require the verification of personal information before providing services, and the privacy of such information is of growing concern. The authors show how federated identity management systems can better protect users' information when integrated with trust …
- 230000002860 competitive 0 abstract description 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
- G06F21/35—User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Bhargav-Spantzel et al. | Trust negotiation in identity management | |
US10333941B2 (en) | Secure identity federation for non-federated systems | |
US7299493B1 (en) | Techniques for dynamically establishing and managing authentication and trust relationships | |
EP1461718B1 (en) | Distributed network identity | |
US8966568B2 (en) | Method and device for data processing and communication system comprising such device | |
EP1560394B1 (en) | Techniques for dynamically establishing and managing authentication and trust relationships | |
Koshutanski et al. | Distributed identity management model for digital ecosystems | |
Lee et al. | Traust: a trust negotiation-based authorization service for open systems | |
Bichsel et al. | An architecture for privacy-ABCs | |
Marillonnet et al. | An Efficient User‐Centric Consent Management Design for Multiservices Platforms | |
Shaikh et al. | Identity management in cloud computing | |
Bhargav-Spantzel et al. | Integrating federated digital identity management and trust negotiation | |
Put et al. | Attribute-based privacy-friendly access control with context | |
Monga et al. | An OAuth-based authentication mechanism for open messaging interface standard | |
Anna | Trust Negotiation in Identity Management | |
Camposo | Securing web services with keycloak | |
Biennier | Web Single Sign On and SAML | |
Bertino et al. | Digital identity management and trust negotiation | |
Squicciarini et al. | Integrating Federated Digital Identity Management and Trust Negotiation–issues and solutions | |
Marillonnet et al. | Research Article An Efficient User-Centric Consent Management Design for Multiservices Platforms | |
Papanchev | An Interoperable Access Control System Based on Self-sovereign Identities | |
Sharma et al. | UDDI and SAML based framework for Secure Semantic Web Services. | |
NATH PANDEY | Secure IDMS for Cloud Computing Environment | |
Semančík | Revised World Wide Web Architecture | |
Heikkinen | Identity management |