Exploiting proxy-based federated identity management in wireless roaming access

  • Authors:
  • Diana Berbecaru;Antonio Lioy;Marco Domenico Aime

  • Affiliations:
  • Politecnico di Torino, Dip. di Automatica e Informatica, Torino, Italy;Politecnico di Torino, Dip. di Automatica e Informatica, Torino, Italy;Politecnico di Torino, Dip. di Automatica e Informatica, Torino, Italy

  • Venue:
  • TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Federated Identity Management technologies are exploited for user authentication in a number of network services but their usage may conflict with security restrictions imposed in a specific domain. We considered a specific case (roaming wireless access for guests) and extended the Stork SAML-based identity federation to cope with this problem by adding dynamic data, called meta-attributes, to be used for authorization even before the user authentication is completed. This concept may be easily extended to other data needed for trust verification and complex authorization decisions in a federated environment.