Computational Issues in Secure Interoperation
IEEE Transactions on Software Engineering
On permissions, inheritance and role hierarchies
Proceedings of the 10th ACM conference on Computer and communications security
Access-Control Language for Multidomain Environments
IEEE Internet Computing
Computer
IEEE Internet Computing
A Pattern Language for Identity Management
ICCGI '07 Proceedings of the International Multi-Conference on Computing in the Global Information Technology
Trust Negotiation in Identity Management
IEEE Security and Privacy
Privacy and Identity Management
IEEE Security and Privacy
Secure Collaboration in a Mediator-Free Distributed Environment
IEEE Transactions on Parallel and Distributed Systems
A user-centric federated single sign-on system
Journal of Network and Computer Applications
A legal information flow (LIF) scheduler based on role-based access control model
Computer Standards & Interfaces
An Ontology-Based Architecture for Federated Identity Management
AINA '09 Proceedings of the 2009 International Conference on Advanced Information Networking and Applications
PRAM: privacy preserving access management scheme in cloud services
Proceedings of the 2013 international workshop on Security in cloud computing
Security similarity based trust in cyber space
Knowledge-Based Systems
Hi-index | 0.00 |
Secure Interoperation between different identity management (IdM) systems has become a challenge. In this paper, a framework is proposed to discover interoperation paths among identity providers (IdP) located in different circles of trust (CoT). According to the proposed framework, interoperation path and path discovery algorithm are proposed to establish a trust relationship between different CoTs. Security of the interoperation path is improved by the deployment of authentication assurance level (AAL) conversion and role mapping. Moreover, security of the path discovery process is guaranteed by path authentication which can resist security violation.