Filters








59,780 Hits in 9.2 sec

Establishing and protecting digital identity in federation systems

Abhilasha Bhargav-Spantzel, Anna C. Squicciarini, Elisa Bertino
2006 Journal of Computer Security  
Our solution supports a step by step approach according to which an individual can first establish a digital identity followed by a secure and protected use of such identity.  ...  We develop solutions for the security and privacy of user identity information in a federation.  ...  ACKNOWLEDGEMENTS The work reported in this paper has been partially sponsored by NSF under the ITR Project 0428554 "The Design and Use of Digital Identities" and by the sponsors of CERIAS.  ... 
doi:10.3233/jcs-2006-14303 fatcat:sspolppft5a65nxmrd2k2ldnlq

Establishing and protecting digital identity in federation systems

Abhilasha Bhargav-Spantzel, Anna C. Squicciarini, Elisa Bertino
2005 Proceedings of the 2005 workshop on Digital identity management - DIM '05  
Our solution supports a step by step approach according to which an individual can first establish a digital identity followed by a secure and protected use of such identity.  ...  We develop solutions for the security and privacy of user identity information in a federation.  ...  ACKNOWLEDGEMENTS The work reported in this paper has been partially sponsored by NSF under the ITR Project 0428554 "The Design and Use of Digital Identities" and by the sponsors of CERIAS.  ... 
doi:10.1145/1102486.1102489 dblp:conf/dim/Bhargav-SpantzelSB05 fatcat:zs2ma7hnj5behezxyqcxitox64

Digital Identity Management and Trust Negotiation [chapter]

Elisa Bertino, Lorenzo D. Martino, Federica Paci, Anna C. Squicciarini
2009 Security for Web Services and Service-Oriented Architectures  
Federated Identity: A federated identity is a digital credential analogous to a country passport.  ...  resources. • The goal: establish trust between parties in order to exchange sensitive information and services • The approach: establish trust by verifying properties of the other party.  ... 
doi:10.1007/978-3-540-87742-4_5 fatcat:jixinabvyzepjhpwgk52a2sfwm

Federated identity management: enabling legal control over digital property in the cloud

Timothy S. Reiniger, Richard J. Hansberger
2014 Digital Evidence and Electronic Signature Law Review  
28 Jeremy Rifkin, The Age of Access (Tarcher Putnam, 2000) at 11-15 and 177-79. 29  ...  Legal controls for identity federation in the cloud FIdM establishes minimum criteria for issuing, managing, validating, and securing electronic identity credentials.  ...  component of the identity system that provides visible evidence of protection against forgery in much the same way as an official seal.  ... 
doi:10.14296/deeslr.v8i0.1953 fatcat:lhmggh4iwfb6beank57h4h6qk4

A Survey on Federated Identity Management Systems Limitation and Solutions

Maha Aldosary, Norah Alqahtani
2021 International journal of network security and its applications  
Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising  ...  In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions.  ...  Security issues regarding a stolen identity will affect all federation partners, credentials (e.g. username and password pairs) must be protected in federated systems.  ... 
doi:10.5121/ijnsa.2021.13304 fatcat:i44er6yldjextnk2zjzkf23xmi

Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS) [chapter]

Ghazi Ben Ayed, Solange Ghernaouti-Hélie
2012 Lecture Notes in Business Information Processing  
Protecting digital identity is crucial aspect in order to successfully enable collaboration between heterogeneous and distributed information systems.  ...  In this context, privacy could play a key role for digital identity protection and security.  ...  In section 2, we explain the need of interoperable privacy within federated digital identity systems and we describe the target PaaSS system.  ... 
doi:10.1007/978-3-642-33068-1_18 fatcat:r7siiugxxzgp5jly3dnuozdski

A Study on the Policies and Regulations of Network Electronic Identity Management

2016 Chinese Journal of Engineering Science  
of ideas and constructive suggestions, the strengthening of cyberspace identity management, and the construction of a cyberspace identity management system.  ...  This paper analyzes and describes the policies, laws, and regulations of cyber electronic identity management in major countries, regions in foreign countries, and China.  ...  This standard defined the technical requirements and framework and identified all standards used for federal identity recognition systems.  ... 
doi:10.15302/j-sscae-2016.06.005 fatcat:z5xehzhiyfhclobcfz3eaexbhi

An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues

Jugoslav Achkoski, Metodija Dojchinovski, Vladimir Trajkovik
2011 Information & Security An International Journal  
of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more.  ...  The workflow which is established through composite services is extending on different endpoints in different domains.  ...  The previously mentioned concept provides a basis for federated identity, which protects the organization and improves security management in order to accomplish authentication and identity to other organizations  ... 
doi:10.11610/isij.2710 fatcat:2o2n4a7jczekpntowlar4w24iu

Identity Management and Control for Clouds [chapter]

Raghu Yeluri, Enrique Castro-Leon
2014 Building the Infrastructure for Cloud Security  
and "How do I federate identity in the cloud?" are very real and thorny ones for cloud providers and subscribers.  ...  In this scenario, the technology for digital identity management (IdM) is fundamental in customizing the user experience, underpinning accountability in the transactions, and  ...  This in turn helps in developing solutions for the protection of digital identity in IdM systems, solutions that ensure such information is not misused and individuals' privacy is guaranteed.  ... 
doi:10.1007/978-1-4302-6146-9_7 fatcat:7rqnbfyfxbhrdkh2zgnfeupihy

Cloud-Based Identity Attribute Service with Privacy Protection in Cyberspace

Xiang Zou, Bing Chen, Bo Jin
2012 Procedia Engineering  
The paper presents the cloud-based service method for user identity attribute service in cyberspace, and the method based on the service model of multilevel cyber identity management provides user identity  ...  With the cyber advancing rapidly, huge scale cyber trusted service and privacy protection has been more and more important.  ...  the pressure of the eID information service platform, system can choose some attribute information stored into the eID digital identity according to system policy and eID digital identity capacity, as  ... 
doi:10.1016/j.proeng.2012.01.105 fatcat:xwlklt3uqngofjvnvcist3ldfi

Global convergence in digital identity and attribute management: Emerging needs for standardization

Maurizio Talamo, Maria Laura Barchiesi, Daniela Merella, Christian H. Schunck
2014 Proceedings of the 2014 ITU kaleidoscope academic conference: Living in a converged world - Impossible without standards?  
. • Digital identity management plays a key role in enabling recognition and the creation of circles of trust.  ...  LINK EXAMPLES Example 1 Example 2 CONCLUSIONS I • For several thousand years societies have learned to establish cooperation and trust in non-digital environments.  ...  Saint Petersburg, Russian Federation, 3-5 June 2014 ITU Kaleidoscope 2014 -Living in a converged world -impossible without standards?  ... 
doi:10.1109/kaleidoscope.2014.6858475 dblp:conf/kaleidoscope/TalamoBMS14 fatcat:4jwpl3is6jhizofmqaw2rma6l4

A Hybrid Scheme for an Interoperable Identity Federation System Based on Attribute Aggregation Method

Samia EL Haddouti, Mohamed Dafir Ech-Cherif EL Kettani
2019 Computers  
Furthermore, the proposed identity federation system is based on a streamlined, cost-effective, and interoperable architecture, which makes this model suitable for large-scale identity federation environments  ...  Several countries have invested in building their identity management systems to equip citizens with infrastructures and tools to benefit from e-services.  ...  Identity management systems combine processes, technologies, and strategies to manage digital identities, and specify how they are used by users to access multiple resources through a single Mobile Digital  ... 
doi:10.3390/computers8030051 fatcat:fv2zbzeepzdc5ho7y5qsqapfbe

A Failure to "Do No Harm" -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S

Pam Dixon
2017 Health and Technology  
It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection  ...  However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often qualitatively not  ...  The role of biometrics in digital identity systems Biometrics are at the center of an emerging set of modern policies related to determining one's identity, and establishing one's identity is key to achieving  ... 
doi:10.1007/s12553-017-0202-6 pmid:29308348 pmcid:PMC5741784 fatcat:izk7ztgidzhn7c7lnmmitttta4

TEco: an integration model to augment the Web with a trust area for inter-pares interactions

Gennaro Costagliola, Vittorio Fuccella, Fernando Antonio Pascuccio
2015 Proceedings of the 21st International Conference on Distributed Multimedia Systems  
In particular, users: own a Trusted Digital Identity to authenticate keeping anonymity (when required); establish Inter-Pares Interactions based on contracted agreements and knowing each other's reputation  ...  We propose an integrated and modular model called TEco. It is a Web-based trust area in which, through the integration of various systems, users interact with a greater degree of trust.  ...  To make it applicable it is necessay that the systems described so far, federated Identity Management system (IdM), federated Reputation Management System (RMS) and federated Content Management Framework  ... 
doi:10.18293/dms2015-051 dblp:conf/dms/CostagliolaFP15 fatcat:kd2jyccmvbhejfyaw4eessedxa

A Security Scheme for Mobile Agent Platforms in Large-Scale Systems [chapter]

Michelle S. Wangham, Joni da Silva Fraga, Rafael R. Obelheiro
2003 Lecture Notes in Computer Science  
In this work, we propose a security scheme for protecting mobile agent platforms in large-scale systems.  ...  Mobile agents have recently started being deployed in largescale distributed systems. However, this new technology brings some security concerns of its own.  ...  , and Rafael Deitos.  ... 
doi:10.1007/978-3-540-45184-6_9 fatcat:i4h564apmfcjre75e2yknfssdi
« Previous Showing results 1 — 15 out of 59,780 results