loading
Federated Identity Management Challenges
2012 Edition, August 1, 2012 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Federated Identity Management is considered a promising approach to facilitate secure resource sharing between collaborating partners. The adoption rate of identity federation technologies in the industrial domain, however, has not been as expected. A structured survey...

Federated identity management
2005 Edition, Volume 38, December 1, 2005 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Most confidential, valuable resources on the World Wide Web are protected by some form of authentication technology. To access these resources, either via the public Internet or private intranets, users must verify their digital identity. This can range from a simple user-name-password...

Attribute Aggregation and Federated Identity
2007 Edition, January 1, 2007 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

A principal sometimes needs to present a combination of attributes from multiple identities from distinct organizations to fully identify itself This problem is rarely encountered in non-federated identity transactions because services operate within the context of a single...

Federated identity in real-life applications
2015 Edition, June 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

This paper describes scenarios and services based on Federated Identity technology. The authors emphasize the Single Sign On mechanism, in which a user's single authentication credential is used to log in once without being prompted to authenticate again to other systems. The overview...

A study on threat model for federated identities in federated identity management system
2010 Edition, Volume 2, June 1, 2010 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Federated Identity Management (FIM) based on standards allows and facilitates participating federated organizations to share users identity attributes, facilitate authentication and grant or deny service access requests. Using single sign-on facility users...

Integral Federated Identity Management for Cloud Computing
2012 Edition, May 1, 2012 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Cloud computing environments may offer different levels of abstraction to its users. Federated identity management, though, does not leverage these abstractions; each user must set up her identity management solution. This situation is further aggravated by the...

Attribute Aggregation in Federated Identity Management
2009 Edition, Volume 42, May 1, 2009 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Most federated identity management systems are limited by users' ability to choose only one identity provider per service session. A proposed linking service lets users securely link their various identity provider (IdP) accounts, enabling the system to aggregate...

User requirement model for federated identities threats
2010 Edition, Volume 6, August 1, 2010 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity...

Federated Identity Management (FIM): Challenges and opportunities
2015 Edition, December 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Federated Identity Management (FIM) is a method that facilitates management of identity processes and policies among the collaborating entities. It also enables secure resource sharing among these entities, but it hasn't been as widely adopted as...

Privacy by Design in Federated Identity Management
2015 Edition, May 1, 2015 - IEEE - Institute of Electrical and Electronics Engineers, Inc.

Federated Identity Management (FIM), while solving important scalability, security and privacy problems of remote entity authentication, introduces new privacy risks. By virtue of sharing identities with many systems, the improved data quality of subjects may increase...

Advertisement