Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2024
Decentralised identity federations using blockchain
International Journal of Information Security (IJOIS), Volume 23, Issue 4Pages 2759–2782https://doi.org/10.1007/s10207-024-00864-6AbstractFederated Identity Management offers numerous economic benefits and convenience to Service Providers and users alike. In such federations, the Identity Provider (IdP) is the solitary entity responsible for managing user credentials and generating ...
- research-articleJanuary 2023
Unified identity authentication scheme of system wide information management based on SAML-PKI-LDAP
International Journal of Information and Computer Security (IJICS), Volume 22, Issue 2Pages 186–209https://doi.org/10.1504/ijics.2023.134959System wide information management (SWIM) is a platform to share and exchange information on the new air traffic management (ATM) services between different departments and systems in the civil aviation field. Through the connection of SWIM and various ...
- research-articleAugust 2022
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 85, Pages 1–10https://doi.org/10.1145/3538969.3543817The eIDAS Regulation aims to provide an interoperable European framework to enable EU citizens to authenticate and communicate with services of other Member States by using their national electronic identity. While a set of high-level requirements (...
- research-articleMay 2020
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud
NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & SecurityArticle No.: 56, Pages 1–6https://doi.org/10.1145/3386723.3387875Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique ...
- research-articleDecember 2019
Securing Spatial Data Infrastructures for Distributed Smart City applications and services
Future Generation Computer Systems (FGCS), Volume 101, Issue CPages 723–736https://doi.org/10.1016/j.future.2019.07.002AbstractSmart Cities are complex distributed systems which may involve multiple stakeholders, applications, sensors, and IoT devices. In order to be able to link and use such heterogeneous data, spatial data infrastructures for Smart Cities ...
-
- ArticleAugust 2019
LDAPRoam: A Generic Solution for Both Web-Based and Non-Web-Based Federate Access
AbstractIdentity federation technology has been widely used in recent years. But the solution for federate access is totally different between the Web-Based and Non-Web-Based scenarios. Furthermore, it is highly limited for lack of support from Non-Web-...
- research-articleJanuary 2019
Identity management using SAML for mobile clients and Internet of Things
Journal of High Speed Networks (JHSN), Volume 25, Issue 1Pages 101–126https://doi.org/10.3233/JHS-190606Cloud computing is a computing paradigm that provides a set of scalable resources on demand. Mobile clients/users and Internet of Things (IoT) are using cloud resources for their applications. However, it also is a target of cyber-attacks and creates ...
- articleOctober 2018
STORK: a real, heterogeneous, large-scale eID management system
International Journal of Information Security (IJOIS), Volume 17, Issue 5Pages 569–585https://doi.org/10.1007/s10207-017-0385-xVerifying who someone is on the Internet is a prerequisite for online services that process sensitive or valuable information. While this has been solved with national or sectorial electronic identification (eID) schemes, general, cross-border solutions ...
- research-articleJanuary 2018
Reprint of Towards a security-enhanced PaaS platform for multi-cloud applications
Future Generation Computer Systems (FGCS), Volume 78, Issue P1Pages 155–175https://doi.org/10.1016/j.future.2016.11.014Multi-cloud adaptive application provisioning can solve the vendor lock-in problem and allows optimising user requirements by selecting the best from the multitude of services offered by different cloud providers. To this end, such provisioning type is ...
- research-articleMarch 2017
Toward Interoperability Approach between Federated Systems
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and ApplicationsArticle No.: 36, Pages 1–6https://doi.org/10.1145/3090354.3090391The main evolution of web services and its exploitation enforce new security challenges, especially in terms of digital identity life cycle management. A set of Identity Management Systems exist to deal with these identities, in order to improve users' ...
- research-articleJuly 2016
An Overview of the Implementation of CILogon at NICS
XSEDE16: Proceedings of the XSEDE16 Conference on Diversity, Big Data, and Science at ScaleArticle No.: 26, Pages 1–5https://doi.org/10.1145/2949550.2949559Authentication for HPC resources has always been a double edged issue. On one hand, HPC facilities would like users to login as easily as possible, but with the increase and complexity of system exploits, HPC centers would like to protect their systems ...
- rfcMay 2016
RFC 7833: A RADIUS Attribute, Binding, Profiles, Name Identifier Format, and Confirmation Methods for the Security Assertion Markup Language (SAML)
This document describes the use of the Security Assertion Markup Language (SAML) with RADIUS in the context of the Application Bridging for Federated Access Beyond web (ABFAB) architecture. It defines two RADIUS attributes, a SAML binding, a SAML name ...
- rfcMay 2016
RFC 7831: Application Bridging for Federated Access Beyond Web (ABFAB) Architecture
Over the last decade, a substantial amount of work has occurred in the space of federated access management. Most of this effort has focused on two use cases: network access and web-based access. However, the solutions to these use cases that have been ...
- ArticleAugust 2015
Secure and Authenticated Access to LLN Resources Through Policy Constraints
AbstractUbiquitous devices comprising several resource-constrained sensors and actuators while having the long desired Internet connectivity, are becoming part of many solutions that seek to enhance user’s environment smartness and quality of living. ...
- research-articleAugust 2015
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services
WCI '15: Proceedings of the Third International Symposium on Women in Computing and InformaticsPages 502–509https://doi.org/10.1145/2791405.2791487The emerging Cloud computing technology, offering computing resources as a service is gaining increasing attention of both the public and private sector. For the whole hearted adoption of Cloud, the service providers need to ensure that only valid users ...
- rfcMay 2015
RFC 7522: Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants
This specification defines the use of a Security Assertion Markup Language (SAML) 2.0 Bearer Assertion as a means for requesting an OAuth 2.0 access token as well as for client authentication.
- rfcMay 2015
RFC 7521: Assertion Framework for OAuth 2.0 Client Authentication and Authorization Grants
This specification provides a framework for the use of assertions with OAuth 2.0 in the form of a new client authentication mechanism and a new authorization grant type. Mechanisms are specified for transporting assertions during interactions with a token ...
- research-articleFebruary 2015
Managing XACML systems in distributed environments through Meta-Policies
Computers and Security (CSEC), Volume 48, Issue CPages 92–115https://doi.org/10.1016/j.cose.2014.10.004Policy-based authorization systems have been largely deployed nowadays to control different privileges over a big amount of resources within a security domain. With policies it is possible to reach a fine-grained level of expressiveness to state proper ...
- ArticleDecember 2014
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
UCC '14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud ComputingPages 726–731https://doi.org/10.1109/UCC.2014.118One of the challenges in a distributed data infrastructure is how users authenticate to the infrastructure, and how their authorisations are tracked. Each user community comes with its own established practices, all different, and users are put off if ...
- ArticleSeptember 2014
CAFS: A Framework for Context-Aware Federated Services
TRUSTCOM '14: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and CommunicationsPages 130–139https://doi.org/10.1109/TrustCom.2014.21In this paper we explore two issues: Federated Identity Management and Context-Aware Services. In the last decade or so we have seen these two technologies gaining considerable popularities as they offer a number of benefits to the user and other ...