A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2010; you can also visit the original URL.
The file type is application/pdf
.
Filters
Establishing and protecting digital identity in federation systems
2006
Journal of Computer Security
Our solution supports a step by step approach according to which an individual can first establish a digital identity followed by a secure and protected use of such identity. ...
We develop solutions for the security and privacy of user identity information in a federation. ...
ACKNOWLEDGEMENTS The work reported in this paper has been partially sponsored by NSF under the ITR Project 0428554 "The Design and Use of Digital Identities" and by the sponsors of CERIAS. ...
doi:10.3233/jcs-2006-14303
fatcat:sspolppft5a65nxmrd2k2ldnlq
Establishing and protecting digital identity in federation systems
2005
Proceedings of the 2005 workshop on Digital identity management - DIM '05
Our solution supports a step by step approach according to which an individual can first establish a digital identity followed by a secure and protected use of such identity. ...
We develop solutions for the security and privacy of user identity information in a federation. ...
ACKNOWLEDGEMENTS The work reported in this paper has been partially sponsored by NSF under the ITR Project 0428554 "The Design and Use of Digital Identities" and by the sponsors of CERIAS. ...
doi:10.1145/1102486.1102489
dblp:conf/dim/Bhargav-SpantzelSB05
fatcat:zs2ma7hnj5behezxyqcxitox64
Digital Identity Management and Trust Negotiation
[chapter]
2009
Security for Web Services and Service-Oriented Architectures
Federated Identity: A federated identity is a digital credential analogous to a country passport. ...
resources. • The goal: establish trust between parties in order to exchange sensitive information and services • The approach: establish trust by verifying properties of the other party. ...
doi:10.1007/978-3-540-87742-4_5
fatcat:jixinabvyzepjhpwgk52a2sfwm
Federated identity management: enabling legal control over digital property in the cloud
2014
Digital Evidence and Electronic Signature Law Review
28 Jeremy Rifkin, The Age of Access (Tarcher Putnam, 2000) at 11-15 and 177-79. 29 ...
Legal controls for identity federation in the cloud FIdM establishes minimum criteria for issuing, managing, validating, and securing electronic identity credentials. ...
component of the identity system that provides visible evidence of protection against forgery in much the same way as an official seal. ...
doi:10.14296/deeslr.v8i0.1953
fatcat:lhmggh4iwfb6beank57h4h6qk4
A Survey on Federated Identity Management Systems Limitation and Solutions
2021
International journal of network security and its applications
Federated Identity Management (FIdM) allows users to distribute their identity information across security domains which increases the portability of their digital identities, and it is considered a promising ...
In this paper, we provide a comparison between FIdM architectures, presented the limitations and risks in FIdM system, and discuss the results and proposed solutions. ...
Security issues regarding a stolen identity will affect all federation partners, credentials (e.g. username and password pairs) must be protected in federated systems. ...
doi:10.5121/ijnsa.2021.13304
fatcat:i44er6yldjextnk2zjzkf23xmi
Service-Oriented Digital Identity-Related Privacy Interoperability: Implementation Framework of Privacy-as-a-Set-of-Services (PaaSS)
[chapter]
2012
Lecture Notes in Business Information Processing
Protecting digital identity is crucial aspect in order to successfully enable collaboration between heterogeneous and distributed information systems. ...
In this context, privacy could play a key role for digital identity protection and security. ...
In section 2, we explain the need of interoperable privacy within federated digital identity systems and we describe the target PaaSS system. ...
doi:10.1007/978-3-642-33068-1_18
fatcat:r7siiugxxzgp5jly3dnuozdski
A Study on the Policies and Regulations of Network Electronic Identity Management
2016
Chinese Journal of Engineering Science
of ideas and constructive suggestions, the strengthening of cyberspace identity management, and the construction of a cyberspace identity management system. ...
This paper analyzes and describes the policies, laws, and regulations of cyber electronic identity management in major countries, regions in foreign countries, and China. ...
This standard defined the technical requirements and framework and identified all standards used for federal identity recognition systems. ...
doi:10.15302/j-sscae-2016.06.005
fatcat:z5xehzhiyfhclobcfz3eaexbhi
An Intelligence Information System based on Service-Oriented Architecture: A Survey of Security Issues
2011
Information & Security An International Journal
of information security considering authentication, authorization, privacy, integrity, trust, federated identities, confidentiality and more. ...
The workflow which is established through composite services is extending on different endpoints in different domains. ...
The previously mentioned concept provides a basis for federated identity, which protects the organization and improves security management in order to accomplish authentication and identity to other organizations ...
doi:10.11610/isij.2710
fatcat:2o2n4a7jczekpntowlar4w24iu
Identity Management and Control for Clouds
[chapter]
2014
Building the Infrastructure for Cloud Security
and "How do I federate identity in the cloud?" are very real and thorny ones for cloud providers and subscribers. ...
In this scenario, the technology for digital identity management (IdM) is fundamental in customizing the user experience, underpinning accountability in the transactions, and ...
This in turn helps in developing solutions for the protection of digital identity in IdM systems, solutions that ensure such information is not misused and individuals' privacy is guaranteed. ...
doi:10.1007/978-1-4302-6146-9_7
fatcat:7rqnbfyfxbhrdkh2zgnfeupihy
Cloud-Based Identity Attribute Service with Privacy Protection in Cyberspace
2012
Procedia Engineering
The paper presents the cloud-based service method for user identity attribute service in cyberspace, and the method based on the service model of multilevel cyber identity management provides user identity ...
With the cyber advancing rapidly, huge scale cyber trusted service and privacy protection has been more and more important. ...
the pressure of the eID information service platform, system can choose some attribute information stored into the eID digital identity according to system policy and eID digital identity capacity, as ...
doi:10.1016/j.proeng.2012.01.105
fatcat:xwlklt3uqngofjvnvcist3ldfi
Global convergence in digital identity and attribute management: Emerging needs for standardization
2014
Proceedings of the 2014 ITU kaleidoscope academic conference: Living in a converged world - Impossible without standards?
. • Digital identity management plays a key role in enabling recognition and the creation of circles of trust. ...
LINK EXAMPLES
Example 1 Example 2
CONCLUSIONS I • For several thousand years societies have learned to establish cooperation and trust in non-digital environments. ...
Saint Petersburg, Russian Federation, 3-5 June 2014 ITU Kaleidoscope 2014 -Living in a converged world -impossible without standards? ...
doi:10.1109/kaleidoscope.2014.6858475
dblp:conf/kaleidoscope/TalamoBMS14
fatcat:4jwpl3is6jhizofmqaw2rma6l4
A Hybrid Scheme for an Interoperable Identity Federation System Based on Attribute Aggregation Method
2019
Computers
Furthermore, the proposed identity federation system is based on a streamlined, cost-effective, and interoperable architecture, which makes this model suitable for large-scale identity federation environments ...
Several countries have invested in building their identity management systems to equip citizens with infrastructures and tools to benefit from e-services. ...
Identity management systems combine processes, technologies, and strategies to manage digital identities, and specify how they are used by users to access multiple resources through a single
Mobile Digital ...
doi:10.3390/computers8030051
fatcat:fv2zbzeepzdc5ho7y5qsqapfbe
A Failure to "Do No Harm" -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S
2017
Health and Technology
It is important that digital biometric identity systems be used by governments with a Do no Harm mandate, and the establishment of regulatory, enforcement and restorative frameworks ensuring data protection ...
However, when, and where large government bureaucracies are involved, the proper planning and execution of public service programs very often result in ungainly outcomes, and are often qualitatively not ...
The role of biometrics in digital identity systems Biometrics are at the center of an emerging set of modern policies related to determining one's identity, and establishing one's identity is key to achieving ...
doi:10.1007/s12553-017-0202-6
pmid:29308348
pmcid:PMC5741784
fatcat:izk7ztgidzhn7c7lnmmitttta4
TEco: an integration model to augment the Web with a trust area for inter-pares interactions
2015
Proceedings of the 21st International Conference on Distributed Multimedia Systems
In particular, users: own a Trusted Digital Identity to authenticate keeping anonymity (when required); establish Inter-Pares Interactions based on contracted agreements and knowing each other's reputation ...
We propose an integrated and modular model called TEco. It is a Web-based trust area in which, through the integration of various systems, users interact with a greater degree of trust. ...
To make it applicable it is necessay that the systems described so far, federated Identity Management system (IdM), federated Reputation Management System (RMS) and federated Content Management Framework ...
doi:10.18293/dms2015-051
dblp:conf/dms/CostagliolaFP15
fatcat:kd2jyccmvbhejfyaw4eessedxa
A Security Scheme for Mobile Agent Platforms in Large-Scale Systems
[chapter]
2003
Lecture Notes in Computer Science
In this work, we propose a security scheme for protecting mobile agent platforms in large-scale systems. ...
Mobile agents have recently started being deployed in largescale distributed systems. However, this new technology brings some security concerns of its own. ...
, and Rafael Deitos. ...
doi:10.1007/978-3-540-45184-6_9
fatcat:i4h564apmfcjre75e2yknfssdi
« Previous
Showing results 1 — 15 out of 59,780 results