A pattern-driven security process for SOA applications
Proceedings of the 2008 ACM symposium on Applied computing
Proceedings of the 2006 conference on Pattern languages of programs
Patterns and Pattern Diagrams for Access Control
TrustBus '08 Proceedings of the 5th international conference on Trust, Privacy and Security in Digital Business
Security patterns for physical access control systems
Proceedings of the 21st annual IFIP WG 11.3 working conference on Data and applications security
APWeb'08 Proceedings of the 10th Asia-Pacific web conference on Progress in WWW research and development
Applicability of security patterns
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Secure interoperation of identity managements among different circles of trust
Computer Standards & Interfaces
A pattern for the WS-Trust standard for web services
Proceedings of the 1st Asian Conference on Pattern Languages of Programs
Hi-index | 0.00 |
The development of software has recently changed significantly. With the ubiquity of computing, users may need to access a wider range of applications, which may not know them in advance. Thus there is a need for dynamic trust establishment and identity exchange protocols and whatever security model is used must support these aspects. As a way to make these concepts more precise and concrete, we define architectural patterns for identity management. These patterns can then be used directly in the software development cycle, as proposed by different methodologies. The Identity Provider pattern centralizes the administration of a security domain's subjects. The Circle of Trust pattern represents a federation of service providers that share trust relationships. The Identity Federation pattern allows to federate multiple identities across multiple organizations under a common identity. This pattern relies on the SAML Assertion pattern, which provides a unifying format for communicating identity information between different security domains.