Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
SoK: A Survey on Technological Trends for (pre)Notified eIDAS Electronic Identity Schemes
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 85, Pages 1–10https://doi.org/10.1145/3538969.3543817The eIDAS Regulation aims to provide an interoperable European framework to enable EU citizens to authenticate and communicate with services of other Member States by using their national electronic identity. While a set of high-level requirements (...
- research-articleMay 2020
Hardening SAML by Integrating SSO and Multi-Factor Authentication (MFA) in the Cloud
NISS '20: Proceedings of the 3rd International Conference on Networking, Information Systems & SecurityArticle No.: 56, Pages 1–6https://doi.org/10.1145/3386723.3387875Even though the cloud paradigm and its associated services has been adopted in various enterprise applications, there has been major issues with regard to authenticating users' critical data. Single Sign on (SSO) is a user authentication technique ...
- research-articleMarch 2017
Toward Interoperability Approach between Federated Systems
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and ApplicationsArticle No.: 36, Pages 1–6https://doi.org/10.1145/3090354.3090391The main evolution of web services and its exploitation enforce new security challenges, especially in terms of digital identity life cycle management. A set of Identity Management Systems exist to deal with these identities, in order to improve users' ...
- research-articleJuly 2016
An Overview of the Implementation of CILogon at NICS
XSEDE16: Proceedings of the XSEDE16 Conference on Diversity, Big Data, and Science at ScaleArticle No.: 26, Pages 1–5https://doi.org/10.1145/2949550.2949559Authentication for HPC resources has always been a double edged issue. On one hand, HPC facilities would like users to login as easily as possible, but with the increase and complexity of system exploits, HPC centers would like to protect their systems ...
- research-articleAugust 2015
A Mobile Based Remote User Authentication Scheme without Verifier Table for Cloud Based Services
WCI '15: Proceedings of the Third International Symposium on Women in Computing and InformaticsPages 502–509https://doi.org/10.1145/2791405.2791487The emerging Cloud computing technology, offering computing resources as a service is gaining increasing attention of both the public and private sector. For the whole hearted adoption of Cloud, the service providers need to ensure that only valid users ...
-
- ArticleDecember 2014
Federated Authentication and Credential Translation in the EUDAT Collaborative Data Infrastructure
UCC '14: Proceedings of the 2014 IEEE/ACM 7th International Conference on Utility and Cloud ComputingPages 726–731https://doi.org/10.1109/UCC.2014.118One of the challenges in a distributed data infrastructure is how users authenticate to the infrastructure, and how their authorisations are tracked. Each user community comes with its own established practices, all different, and users are put off if ...
- research-articleJuly 2013
CILogon: a federated X.509 certification authority for cyberinfrastructure logon
XSEDE '13: Proceedings of the Conference on Extreme Science and Engineering Discovery Environment: Gateway to DiscoveryArticle No.: 53, Pages 1–7https://doi.org/10.1145/2484762.2484791CILogon provides a federated X.509 certification authority for secure access to cyberinfrastructure such as the Extreme Science and Engineering Discovery Environment (XSEDE). CILogon relies on federated authentication (SAML and OpenID) for determining ...
- research-articleJune 2011
An integrated approach for identity and access management in a SOA context
SACMAT '11: Proceedings of the 16th ACM symposium on Access control models and technologiesPages 21–30https://doi.org/10.1145/1998441.1998446In this paper, we present an approach for identity and access management (IAM) in the context of (cross-organizational) service-oriented architectures (SOA). In particular, we defined a domain-specific language (DSL) for role-based access control (RBAC) ...
- ArticleMay 2011
Supporting Federated Multi-authority Security Models
CCGRID '11: Proceedings of the 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid ComputingPages 620–621https://doi.org/10.1109/CCGrid.2011.77The JISC-funded Shintau project has produced an extension to the Shibboleth profile which allows a user to link information from more than one IdP together utilising a custom Linking Service (LS). This paper describes both the application and ...
- research-articleAugust 2010
TeraGrid Science Gateway AAAA Model: implementation and lessons learned
TG '10: Proceedings of the 2010 TeraGrid ConferenceArticle No.: 2, Pages 1–6https://doi.org/10.1145/1838574.1838576In this paper, we present our experience implementing on the TeraGrid the "Science Gateway AAAA Model" we proposed in our 2005 paper. We describe how we have modified the model based on our experiences, the details of our implementation, an update on ...
- research-articleApril 2010
CardSpace-liberty integration for CardSpace users
IDTRUST '10: Proceedings of the 9th Symposium on Identity and Trust on the InternetPages 12–25https://doi.org/10.1145/1750389.1750392Whilst the growing number of identity management systems have the potential to reduce the threat of identity attacks, major deployment problems remain because of the lack of interoperability between such systems. In this paper we propose a novel scheme ...
- research-articleApril 2010
Federated login to TeraGrid
IDTRUST '10: Proceedings of the 9th Symposium on Identity and Trust on the InternetPages 1–11https://doi.org/10.1145/1750389.1750391We present a new federated login capability for the TeraGrid, currently the world's largest and most comprehensive distributed cyberinfrastructure for open scientific research. Federated login enables TeraGrid users to authenticate using their home ...
- research-articleNovember 2009
Enhancing the earth system grid security infrastructure through single sign-on and autoprovisioning
- F. Siebenlist,
- R. Ananthakrishnan,
- D. E. Bernholdt,
- L. Cinquini,
- I. T. Foster,
- D. E. Middleton,
- N. Miller,
- D. N. Williams
GCE '09: Proceedings of the 5th Grid Computing Environments WorkshopArticle No.: 13, Pages 1–8https://doi.org/10.1145/1658260.1658278In this paper, we discuss recent development and implementation efforts by the Earth System Grid (ESG) concerning its security infrastructure. ESG's requirements are to make user logon as easy as possible and to facilitate the integration of security ...
- research-articleMarch 2008
A federation of web services for Danish health care
IDtrust '08: Proceedings of the 7th symposium on Identity and trust on the InternetPages 112–121https://doi.org/10.1145/1373290.1373305Having relevant, up-to-date information about a patient's health care history is often crucial for providing the appropriate treatment. In Denmark, IT systems have been built to support different work flows in the health sector, but the systems are ...
- research-articleMarch 2008
OpenID identity discovery with XRI and XRDS
IDtrust '08: Proceedings of the 7th symposium on Identity and trust on the InternetPages 19–25https://doi.org/10.1145/1373290.1373294The work examines the identity discovery problems that needed to be addressed by the OpenID 2.0 protocol in order to enable a user-centric Internet identity layer. The paper illustrates how the OASIS XRI and XRDS specifications were applied to help ...
- research-articleJanuary 2008
Commitment issues in delegation process
AISC '08: Proceedings of the sixth Australasian conference on Information security - Volume 81Pages 27–38Delegation is a powerful mechanism to provide flexible and dynamic access control decisions. Delegation is particularly useful in federated environments where multiple systems, with their own security autonomy, are connected under one common federation. ...
- ArticleNovember 2007
Next steps for security assertion markup language (saml)
SWS '07: Proceedings of the 2007 ACM workshop on Secure web servicesPages 52–65https://doi.org/10.1145/1314418.1314427The Security Assertion Markup Language (SAML) has established itself as one of the most advanced and popular standards in the Identity Federation and Assertion management space. SAML 2.0 has proved to be an almost complete specification, without ...
- ArticleNovember 2007
Identity federation for voip-based services
DIM '07: Proceedings of the 2007 ACM workshop on Digital identity managementPages 62–71https://doi.org/10.1145/1314403.1314414Identity Federation enables managing a single User's multiple Identities across administrative domains. Instead of forcing a single Identity for the User, it leverages trust between Service Providers to share User Identity information viz. ...
- research-articleOctober 2007
Secure grid monitoring, a web-based framework
- Brajendra K. Singh,
- Amirhasan Amintabar,
- Akshai Aggarwal,
- Robert D. Kent,
- Ahmedur Rahman,
- Farhan Mirza,
- Zillur Rahman
GridNets '07: Proceedings of the first international conference on Networks for grid applicationsArticle No.: 15, Pages 1–7The problem of securely monitoring the grid, in which a group of different entities provide and exchanging confidential information has become a significant task for an efficient use of shared resources. In this paper, a Web based secure grid monitoring ...
- ArticleNovember 2006
User privacy-preserving identity data dependencies
DIM '06: Proceedings of the second ACM workshop on Digital identity managementPages 45–54https://doi.org/10.1145/1179529.1179537Identity Federation technologies have enabled users to leverage their relationships with an Identity Provider (IdP) into a Service Provider's (SP) domain. They allow user-initiated and IdP-controlled sharing of authentication information, attributes and ...