Protecting privacy using the decentralized label model
ACM Transactions on Software Engineering and Methodology (TOSEM)
Efficient comparison of enterprise privacy policies
Proceedings of the 2004 ACM symposium on Applied computing
Toward autonomic web services trust and selection
Proceedings of the 2nd international conference on Service oriented computing
Adaptive trust negotiation and access control
Proceedings of the tenth ACM symposium on Access control models and technologies
A delegation framework for federated identity management
Proceedings of the 2005 workshop on Digital identity management
Access control management in a distributed environment supporting dynamic collaboration
Proceedings of the 2005 workshop on Digital identity management
Safety in automated trust negotiation
ACM Transactions on Information and System Security (TISSEC)
Trust Negotiation in Identity Management
IEEE Security and Privacy
Privacy-aware role based access control
Proceedings of the 12th ACM symposium on Access control models and technologies
A Review on Trust and Reputation for Web Service Selection
ICDCSW '07 Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
Privilege federation between different user profiles for service federation
Proceedings of the 4th ACM workshop on Digital identity management
Personalized access control for a personally controlled health record
Proceedings of the 2nd ACM workshop on Computer security architectures
Computer
A calculus of trust and its application to PKI and identity management
Proceedings of the 8th Symposium on Identity and Trust on the Internet
Exploiting proxy-based federated identity management in wireless roaming access
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
Identity federation is a key factor for a user to access multiple service providers seamlessly. Many protocols that federate between the providers have been proposed. Such protocols are operated under the same rules of identity management between the federated providers. Moreover, cross-protocol federation that uses different protocols for federation between the providers has also been proposed. However, the providers cannot federate all user information even though they do so using the cross-protocol federation because they do not confirm whether the federated providers obey the same rules or not. A federation bridge that converts and regulates the interaction messages between the providers is described herein. With it, the provider can federate based on the rules that a user and the providers determine.