A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Building Blocks for Identity Federations
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we introduce a solution catalogue of reusable building blocks for Identity and Access Management (IAM). ...
Beyond merely providing access control for a single isolated system, modern, flexible architectures support a business-spanning federation of applications and services by sharing digital identities. ...
In this paper, we propose reusable building blocks based on a simple, extendable model, the Federated Identity Model. ...
doi:10.1007/11531371_29
fatcat:j7ofefuivjfjtbytlmv7x2pcxm
A modeling approach to federated identity and access management
2005
Special interest tracks and posters of the 14th international conference on World Wide Web - WWW '05
As an approach to such problems, in this paper, we introduce a solution catalogue of reusable building blocks for Identity and Access Management (IAM). ...
The concepts of these blocks have been realized in a configurable system that supports IAM solutions for Web-based applications. ...
The building blocks provide solutions to common problems using concepts from security and federation specifications. ...
doi:10.1145/1062745.1062916
dblp:conf/www/GaedkeMN05
fatcat:epoxvxumvre5npalxjwsg4jpua
Digital Identity Management and Trust Negotiation
[chapter]
2009
Security for Web Services and Service-Oriented Architectures
Building Blocks: 1. Subject Credentials: Assertions about the credential owner issued by a Certification Authority 2. ...
Federated Identity: A federated identity is a digital credential analogous to a country passport. ...
doi:10.1007/978-3-540-87742-4_5
fatcat:jixinabvyzepjhpwgk52a2sfwm
Putting on the Velvet Glove: The Paradox of "Soft" Core Values in "Hard" Organizations
2015
Administration & Society
It paves the way for the redefinition of the entity's business in organizational terms and for the corresponding adoption of building blocks that help transform the entity into 'organization'. ...
As a very visible organizational building block, ideal for shaping legitimacy (Dowling & Pfeffer, 1975) , its contents can be expected to reflect hard actorhood values so as to conform to prevailing modern ...
doi:10.1177/0095399715581471
fatcat:5qdvnmqvxjeu7nsh56cepv43re
DID-eFed: Facilitating Federated Learning as a Service with Decentralized Identities
[article]
2021
arXiv
pre-print
Federated learning (FL) emerges as a functional solution that can help build high-performance models shared among multiple parties while still complying with user privacy and data confidentiality requirements ...
We have entered the era of big data, and it is considered to be the "fuel" for the flourishing of artificial intelligence applications. ...
Disclaimer clause for CLARIFY (H2020-MSCA-ITN-2019). ...
arXiv:2105.08671v1
fatcat:jogtjghlcnebphfevounhiioxq
Blockchain-based federated identity and auditing
2020
International Journal of Blockchains and Cryptocurrencies
A federated identity is a single identity that enables users to access multiple services across a network of business parties. ...
Users of this network can access services provided by any one of the participating parties using a single federated identity. ...
Consequently, there is a need to investigate new technologies for building a more robust federated identity system that can deal with these challenges. ...
doi:10.1504/ijbc.2020.10031109
fatcat:3mljex7zczcaxiuxyakheztl6e
Patterns for Authentication and Authorisation Infrastructures
2007
18th International Conference on Database and Expert Systems Applications (DEXA 2007)
Building on these experiences, we define a pattern system for AAIs. It will ensure interoperability and quality of future AAI solutions. ...
Authentication and Authorisation Infrastructures (AAIs) enhanced with an attribute-based access control model (ABAC) offer such services to service federations and customers. ...
User Authentication Block -I
Identity Federation Pattern -i
Authenticator Pattern -ii
Identity Provider Pattern -iii
Circle of Trust Pattern -iv
Credential Pattern -v
SAML Assertion Block - ...
doi:10.1109/dexa.2007.4
dblp:conf/dexaw/ErberSP07
fatcat:vbwk6antgjhmffln2epjgbraoy
Who Got All of My Personal Data? Enabling Users to Monitor the Proliferation of Shared Personally Identifiable Information
[chapter]
2012
IFIP Advances in Information and Communication Technology
Moreover, we outline the building blocks of user-based information management on the basis of existing approaches, which support users in managing data flows and an investigation that we did on the linkability ...
Furthermore, we contrast user-based information management with our experiences in developing and operating federated identity management services at the Karlsruhe Institute of Technology (KIT). 1 ...
We would like to thank the anonymous reviewers for their invaluable comments. ...
doi:10.1007/978-3-642-31668-5_9
fatcat:b7mrh7wrhvdljhuo5bbhsqkgne
MORFOLOGIJA I GRADSKI REPERI – ODRAZ SLIKE NOVOG BEOGRADA
2021
Zbornik Radova Građevinskog Fakulteta
The question is in which direction will New Belgrade build its new identity? ...
As a consequence, there is a difficulty in navigating the space, because the blocks resemble each other. Exceptions are certain objects that stand out for their height, size or purpose. ...
of a set of criteria that will best show the current state of blocks and parts of blocks, whose selection was made on the basis of recognizability and importance in terms of identity and potential for ...
doi:10.14415/konferencijagfs2021.49
fatcat:mxj62of45rcr7kjmiud72kxnea
E-Resource Interoperability: Libraries Moving To Federated Single Sign-On
2018
Zenodo
Still, many libraries hesitate to move away from IP-based authentication towards SSO with Federated Identity Management, although they could profit in terms of user satisfaction and cost efficiency. ...
Publishers like to ask personal information for the personification of their users on their websites. ...
architectural building blocks and best practices to enable research and e-infrastructures to build interoperable AAI • Avoid a future in which new research collaborations develop independent AAIs • Authentication ...
doi:10.5281/zenodo.1308028
fatcat:adrpckzg4ra4xmsqgzowhsnrfa
Authentication And Authorisation And Federations
2018
Zenodo
We present an overview of Federations used in wider areas of Science. ...
Address eScience requirements -Deliver a blueprint architecture and a number of building blocks to meet eScience requirements. ...
Main focus of AARC for the next two years • Promote and get inputs on AARC results • Address authorisation aspects • Work on assurance and combined levels • Build a policy toolkit for r-infras • Consolidate ...
doi:10.5281/zenodo.1292818
fatcat:bt4hmize6zb65p56vj4eub4m2y
EOSC-hub D10.4 EOSC Hub Technical Architecture and standards roadmap
2019
Zenodo
EOSC-hub is working on defining the building blocks of the architecture for each service type and specified a common approach to complete this task. ...
It foresees the identification of the main building blocks/technical functions in each service category and, for each of those, the definition of a technical specification that includes a high-level architecture ...
Building blocks for thematic services. ...
doi:10.5281/zenodo.5033352
fatcat:63nv4tjmurfirnjiwomkzidd3y
Trustless Blockchain-based Access Control in Dynamic Collaboration
2018
International Conference on Big Data and Cyber-Security Intelligence
In this paper, we investigate the authorization process that manages permissions and rights of access to shared services in a federation of enterprises and we propose a solution based on the Ethereum Blockchain ...
The mode of operation is halfway between the isolated identity model and the federated identity model. ...
In federated identity architecture, each service provider uses its own identity provider, but is able to accept identities from other providers. ...
dblp:conf/bdcsintell/AlmakhourSSG18
fatcat:sdsk6mv3yjexjibioyctdq4noi
Maintaining Zero Trust With Federation
2021
International Journal of Emerging Technology and Advanced Engineering
Federated activity presents a challenge for enterprises with high-level security architectures. ...
This paper presents methods for an enterprise to extend its zero trust security policies to include federation partners. ...
ACKNOWLEDGEMENTS The authors would like to thank the Institute for Defense Analyses for their unflagging support. ...
doi:10.46338/ijetae0521_03
fatcat:cyjdtewbmfg3hdx5tzb2otjit4
Sustaining Heritage Patterns in Mining Towns of the North American West: A Historico-Geographical Approach
2021
Heritage
Among principal research methods used by urban morphologists, the historico-geographical approach is particularly helpful for interpreting formative and transformative processes and for identifying key ...
Urban morphology provides essential methodologies to inform processes for heritage preservation and design intervention in historic places. ...
Towns within the Coeur d'Alene Mining District, including Wallace, were designated as "Superfund" sites by the federal government following mine closures in 1983 rendering them eligible for federal funding ...
doi:10.3390/heritage4020052
fatcat:cz2odpg72fhqbozdk6uchqggue
« Previous
Showing results 1 — 15 out of 113,261 results