Federation proxy for cross domain identity federation

作者: Makoto Hatakeyama

DOI: 10.1145/1655028.1655041

关键词: Proxy (climate)Identity managementIdentity (object-oriented programming)Key (cryptography)Service providerComputer scienceUser informationWorld Wide WebDomain (software engineering)Internet privacy

摘要: Identity federation is a key factor for user to access multiple service providers seamlessly. Many protocols that federate between the have been proposed. Such are operated under same rules of identity management federated providers. Moreover, cross-protocol uses different has also However, cannot all information even though they do so using because not confirm whether obey or not. A bridge converts and regulates interaction messages described herein. With it, provider can based on determine.

参考文章(17)
Massimo Marchiori, Lorrie Cranor, Marc Langheinrich, Martin Presler-Marshall, Joseph Reagle, The platform for privacy preferences 1.0 (p3p1.0) specification W3C Recommendation. ,(2002)
Paul Madsen, Hiroki Itoh, Challenges to Supporting Federated Assurance IEEE Computer. ,vol. 42, pp. 42- 49 ,(2009) , 10.1109/MC.2009.149
Tatyana Ryutov, Li Zhou, Clifford Neuman, Travis Leithead, Kent E. Seamons, Adaptive trust negotiation and access control symposium on access control models and technologies. pp. 139- 146 ,(2005) , 10.1145/1063979.1064004
Hidehito Gomi, Makoto Hatakeyama, Shigeru Hosono, Satoru Fujita, A delegation framework for federated identity management Proceedings of the 2005 workshop on Digital identity management - DIM '05. pp. 94- 103 ,(2005) , 10.1145/1102486.1102502
Lillian Røstad, Øystein Nytrø, Personalized access control for a personally controlled health record Proceedings of the 2nd ACM workshop on Computer security architectures - CSAW '08. pp. 9- 16 ,(2008) , 10.1145/1456508.1456511
Matt Blaze, Sampath Kannan, Insup Lee, Oleg Sokolsky, Jonathan M. Smith, Angelos D. Keromytis, Wenke Lee, Dynamic Trust Management IEEE Computer. ,vol. 42, pp. 44- 52 ,(2009) , 10.1109/MC.2009.51
Michael Backes, Günter Karjoth, Walid Bagga, Matthias Schunter, Efficient comparison of enterprise privacy policies acm symposium on applied computing. pp. 375- 382 ,(2004) , 10.1145/967900.967983
Jingwei Huang, David Nicol, A calculus of trust and its application to PKI and identity management Proceedings of the 8th Symposium on Identity and Trust on the Internet - IDtrust '09. pp. 23- 37 ,(2009) , 10.1145/1527017.1527021
William H. Winsborough, Ninghui Li, Safety in automated trust negotiation ACM Transactions on Information and System Security. ,vol. 9, pp. 352- 390 ,(2006) , 10.1145/1178618.1178623
Abhilasha Bhargav-Spantzel, Anna C. Squicciarini, Elisa Bertino, Trust Negotiation in Identity Management ieee symposium on security and privacy. ,vol. 5, pp. 55- 63 ,(2007) , 10.1109/MSP.2007.46