National e-ID card schemes: A European overview
Information Security Tech. Report
Towards dynamic trust establishment for identity federation
Proceedings of the 2009 Euro American Conference on Telematics and Information Systems: New Opportunities to increase Digital Citizenship
Interoperability and anonymity for ID management systems
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 2
Sharing enriched multimedia experiences across heterogeneous network infrastructures
IEEE Communications Magazine
An OpenID provider based on SSL smart cards
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
OpenIDemail enabled browser: towards fixing the broken web single sign-on triangle
Proceedings of the 6th ACM workshop on Digital identity management
A billion keys, but few locks: the crisis of web single sign-on
Proceedings of the 2010 workshop on New security paradigms
Introducing a cross federation identity solution for converged network environments
Principles, Systems and Applications of IP Telecommunications
Benefits of federated identity management: a survey from an integrated operations viewpoint
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Exploiting proxy-based federated identity management in wireless roaming access
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Key challenges in defending against malicious socialbots
LEET'12 Proceedings of the 5th USENIX conference on Large-Scale Exploits and Emergent Threats
Security and Communication Networks
On breaking SAML: be whoever you want to be
Security'12 Proceedings of the 21st USENIX conference on Security symposium
A Metric-Based Approach to Assess Risk for "On Cloud" Federated Identity Management
Journal of Network and Systems Management
FedCohesion: federated identity management in the marche region
EGOVIS'12/EDEM'12 Proceedings of the 2012 Joint international conference on Electronic Government and the Information Systems Perspective and Electronic Democracy, and Proceedings of the 2012 Joint international conference on Advancing Democracy, Government and Governance
A hybrid approach for highly available and secure storage of Pseudo-SSO credentials
NordSec'12 Proceedings of the 17th Nordic conference on Secure IT Systems
Design and analysis of a social botnet
Computer Networks: The International Journal of Computer and Telecommunications Networking
Taking data exposure into account: how does it affect the choice of sign-in accounts?
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Investigating Users’ Perspectives of Web Single Sign-On: Conceptual Gaps and Acceptance Model
ACM Transactions on Internet Technology (TOIT)
Proceedings of International Conference on Information Integration and Web-based Applications & Services
Preservation-awareness in collaborative engineering
Computers in Industry
Towards the integration of reputation management in OpenID
Computer Standards & Interfaces
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
Digital identities can be associated with everything from people to software applications to entire companies, but human digital identities prove the most interesting and challenging. Human digital identities can simplify network usage and enable new classes of applications, but they also introduce security and privacy risks. Federated identity management addresses scenarios in both enterprise and consumer contexts by defining how to dynamically distribute identity information and delegate identity tasks across security domains. This article explains federated identity's components, discusses security and privacy risks and architectural challenges, surveys the SAML, OpenID, and InfoCard protocols, and reviews new developments in federated identity management.