113,261 Hits in 3.4 sec

Building Blocks for Identity Federations [chapter]

Johannes Meinecke, Martin Nussbaumer, Martin Gaedke
2005 Lecture Notes in Computer Science  
In this paper, we introduce a solution catalogue of reusable building blocks for Identity and Access Management (IAM).  ...  Beyond merely providing access control for a single isolated system, modern, flexible architectures support a business-spanning federation of applications and services by sharing digital identities.  ...  In this paper, we propose reusable building blocks based on a simple, extendable model, the Federated Identity Model.  ... 
doi:10.1007/11531371_29 fatcat:j7ofefuivjfjtbytlmv7x2pcxm

A modeling approach to federated identity and access management

Martin Gaedke, Johannes Meinecke, Martin Nussbaumer
2005 Special interest tracks and posters of the 14th international conference on World Wide Web - WWW '05  
As an approach to such problems, in this paper, we introduce a solution catalogue of reusable building blocks for Identity and Access Management (IAM).  ...  The concepts of these blocks have been realized in a configurable system that supports IAM solutions for Web-based applications.  ...  The building blocks provide solutions to common problems using concepts from security and federation specifications.  ... 
doi:10.1145/1062745.1062916 dblp:conf/www/GaedkeMN05 fatcat:epoxvxumvre5npalxjwsg4jpua

Digital Identity Management and Trust Negotiation [chapter]

Elisa Bertino, Lorenzo D. Martino, Federica Paci, Anna C. Squicciarini
2009 Security for Web Services and Service-Oriented Architectures  
Building Blocks: 1. Subject Credentials: Assertions about the credential owner issued by a Certification Authority 2.  ...  Federated Identity: A federated identity is a digital credential analogous to a country passport.  ... 
doi:10.1007/978-3-540-87742-4_5 fatcat:jixinabvyzepjhpwgk52a2sfwm

Putting on the Velvet Glove: The Paradox of "Soft" Core Values in "Hard" Organizations

Arild Wæraas
2015 Administration & Society  
It paves the way for the redefinition of the entity's business in organizational terms and for the corresponding adoption of building blocks that help transform the entity into 'organization'.  ...  As a very visible organizational building block, ideal for shaping legitimacy (Dowling & Pfeffer, 1975) , its contents can be expected to reflect hard actorhood values so as to conform to prevailing modern  ... 
doi:10.1177/0095399715581471 fatcat:5qdvnmqvxjeu7nsh56cepv43re

DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities [article]

Jiahui Geng, Neel Kanwal, Martin Gilje Jaatun, Chunming Rong
2021 arXiv   pre-print
Federated learning (FL) emerges as a functional solution that can help build high-performance models shared among multiple parties while still complying with user privacy and data confidentiality requirements  ...  We have entered the era of big data, and it is considered to be the "fuel" for the flourishing of artificial intelligence applications.  ...  Disclaimer clause for CLARIFY (H2020-MSCA-ITN-2019).  ... 
arXiv:2105.08671v1 fatcat:jogtjghlcnebphfevounhiioxq

Blockchain-based federated identity and auditing

Syed Mir, Miriam A.M. Capretz, Katarina Grolinger, Hany F. ElYamany, Mahmoud M. ElGayyar
2020 International Journal of Blockchains and Cryptocurrencies  
A federated identity is a single identity that enables users to access multiple services across a network of business parties.  ...  Users of this network can access services provided by any one of the participating parties using a single federated identity.  ...  Consequently, there is a need to investigate new technologies for building a more robust federated identity system that can deal with these challenges.  ... 
doi:10.1504/ijbc.2020.10031109 fatcat:3mljex7zczcaxiuxyakheztl6e

Patterns for Authentication and Authorisation Infrastructures

Roland Erber, Christian Schlager, Gunther Pernul
2007 18th International Conference on Database and Expert Systems Applications (DEXA 2007)  
Building on these experiences, we define a pattern system for AAIs. It will ensure interoperability and quality of future AAI solutions.  ...  Authentication and Authorisation Infrastructures (AAIs) enhanced with an attribute-based access control model (ABAC) offer such services to service federations and customers.  ...  User Authentication Block -I Identity Federation Pattern -i Authenticator Pattern -ii Identity Provider Pattern -iii Circle of Trust Pattern -iv Credential Pattern -v SAML Assertion Block -  ... 
doi:10.1109/dexa.2007.4 dblp:conf/dexaw/ErberSP07 fatcat:vbwk6antgjhmffln2epjgbraoy

Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information [chapter]

Sebastian Labitzke
2012 IFIP Advances in Information and Communication Technology  
Moreover, we outline the building blocks of user-based information management on the basis of existing approaches, which support users in managing data flows and an investigation that we did on the linkability  ...  Furthermore, we contrast user-based information management with our experiences in developing and operating federated identity management services at the Karlsruhe Institute of Technology (KIT). 1  ...  We would like to thank the anonymous reviewers for their invaluable comments.  ... 
doi:10.1007/978-3-642-31668-5_9 fatcat:b7mrh7wrhvdljhuo5bbhsqkgne


Sara Milošević, Marija Divac, Katarina Jevtić-Novaković
2021 Zbornik Radova Građevinskog Fakulteta  
The question is in which direction will New Belgrade build its new identity?  ...  As a consequence, there is a difficulty in navigating the space, because the blocks resemble each other. Exceptions are certain objects that stand out for their height, size or purpose.  ...  of a set of criteria that will best show the current state of blocks and parts of blocks, whose selection was made on the basis of recognizability and importance in terms of identity and potential for  ... 
doi:10.14415/konferencijagfs2021.49 fatcat:mxj62of45rcr7kjmiud72kxnea

E-Resource Interoperability: Libraries Moving To Federated Single Sign-On

Jos Westerbeke, Peter Gietz, Barbara Monticine, Jiri Pavlik
2018 Zenodo  
Still, many libraries hesitate to move away from IP-based authentication towards SSO with Federated Identity Management, although they could profit in terms of user satisfaction and cost efficiency.  ...  Publishers like to ask personal information for the personification of their users on their websites.  ...  architectural building blocks and best practices to enable research and e-infrastructures to build interoperable AAI • Avoid a future in which new research collaborations develop independent AAIs • Authentication  ... 
doi:10.5281/zenodo.1308028 fatcat:adrpckzg4ra4xmsqgzowhsnrfa

Authentication And Authorisation And Federations

Davide Vaghetti
2018 Zenodo  
We present an overview of Federations used in wider areas of Science.  ...  Address eScience requirements -Deliver a blueprint architecture and a number of building blocks to meet eScience requirements.  ...  Main focus of AARC for the next two years • Promote and get inputs on AARC results • Address authorisation aspects • Work on assurance and combined levels • Build a policy toolkit for r-infras • Consolidate  ... 
doi:10.5281/zenodo.1292818 fatcat:bt4hmize6zb65p56vj4eub4m2y

EOSC-hub D10.4 EOSC Hub Technical Architecture and standards roadmap

Giacinto Donvito, Diego Scardaci, Mark Van De Sanden
2019 Zenodo  
EOSC-hub is working on defining the building blocks of the architecture for each service type and specified a common approach to complete this task.  ...  It foresees the identification of the main building blocks/technical functions in each service category and, for each of those, the definition of a technical specification that includes a high-level architecture  ...  Building blocks for thematic services.  ... 
doi:10.5281/zenodo.5033352 fatcat:63nv4tjmurfirnjiwomkzidd3y

Trustless Blockchain-based Access Control in Dynamic Collaboration

Mouhamad Almakhour, Layth Sliman, Abed Ellatif Samhat, Walid Gaaloul
2018 International Conference on Big Data and Cyber-Security Intelligence  
In this paper, we investigate the authorization process that manages permissions and rights of access to shared services in a federation of enterprises and we propose a solution based on the Ethereum Blockchain  ...  The mode of operation is halfway between the isolated identity model and the federated identity model.  ...  In federated identity architecture, each service provider uses its own identity provider, but is able to accept identities from other providers.  ... 
dblp:conf/bdcsintell/AlmakhourSSG18 fatcat:sdsk6mv3yjexjibioyctdq4noi

Maintaining Zero Trust With Federation

William R. Simpson, Institute for Defense Analyses (IDA), Alexandria, Virginia USA., Kevin E. Foltz
2021 International Journal of Emerging Technology and Advanced Engineering  
Federated activity presents a challenge for enterprises with high-level security architectures.  ...  This paper presents methods for an enterprise to extend its zero trust security policies to include federation partners.  ...  ACKNOWLEDGEMENTS The authors would like to thank the Institute for Defense Analyses for their unflagging support.  ... 
doi:10.46338/ijetae0521_03 fatcat:cyjdtewbmfg3hdx5tzb2otjit4

Sustaining Heritage Patterns in Mining Towns of the North American West: A Historico-Geographical Approach

Wendy R. McClure
2021 Heritage  
Among principal research methods used by urban morphologists, the historico-geographical approach is particularly helpful for interpreting formative and transformative processes and for identifying key  ...  Urban morphology provides essential methodologies to inform processes for heritage preservation and design intervention in historic places.  ...  Towns within the Coeur d'Alene Mining District, including Wallace, were designated as "Superfund" sites by the federal government following mine closures in 1983 rendering them eligible for federal funding  ... 
doi:10.3390/heritage4020052 fatcat:cz2odpg72fhqbozdk6uchqggue
« Previous Showing results 1 — 15 out of 113,261 results