A network access control approach based on the AAA architecture and authorization attributes
Network access control mechanisms constitute an increasingly needed service, when
communications are becoming more and more ubiquitous thanks to some technologies such …
communications are becoming more and more ubiquitous thanks to some technologies such …
Delegation of access rights in multi-domain service compositions
L Bussard, A Nano, U Pinsdorf - Identity in the Information Society, 2009 - Springer
Today, it becomes more and more common to combine services from different providers into
one application. Service composition is however difficult and cumbersome when there is no …
one application. Service composition is however difficult and cumbersome when there is no …
A heterogeneous network access service based on PERMIS and SAML
The expansion of inter-organizational scenarios based on different authorization schemes
involves the development of integration solutions allowing different authorization domains to …
involves the development of integration solutions allowing different authorization domains to …
using microsoft office infopath to generate XACML policies
Today, when organizations perform access control over their resources they are not only
interested in the user's identity, but in other data such as user's attributes or contextual …
interested in the user's identity, but in other data such as user's attributes or contextual …
A model for authentication credentials translation in service oriented architecture
ER De Mello, MS Wangham, J da Silva Fraga… - … Science IV: Special …, 2009 - Springer
Due to the increasing number of service providers, the grouping of these providers following
the federation concept and the use of the Single Sign On (SSO) concept are helping users to …
the federation concept and the use of the Single Sign On (SSO) concept are helping users to …
Extensible Model and Policy Engine for Usage Control and Policy-Based Governance: Industrial Applications
A Hariri - 2024 - iris.unitn.it
The main focus of this thesis is applied research targeting industrial applications of Usage
Control (UCON) and policy-based governance. Nonetheless, we also tackle an associated …
Control (UCON) and policy-based governance. Nonetheless, we also tackle an associated …
Extending the common services of edugain with a credential conversion service
We are experiencing the emergence of federated approaches to resource sharing. In these
approaches, trust links are established among different autonomous organizations in order …
approaches, trust links are established among different autonomous organizations in order …
Architektur und Werkzeuge für dynamisches Identitätsmanagement in Föderationen
D Pöhn - 2016 - edoc.ub.uni-muenchen.de
Abstract Federated Identity Management (FIM) hat die Motivation, Identitätsdaten eines
Benutzers von einer Heimatorganisation, dh Identity Provider (IdP), einem Dienstbetreiber …
Benutzers von einer Heimatorganisation, dh Identity Provider (IdP), einem Dienstbetreiber …
An access control system for multimedia content distribution
Multimedia content distribution has appeared as a new growth market offered by network
providers, defining resource access infrastructures able to support both wired and wireless …
providers, defining resource access infrastructures able to support both wired and wireless …
[PDF][PDF] A proposal for extending the eduroam infrastructure with authorization mechanisms
Identity federations are emerging in the last years in order to make easier the deployment of
resource sharing environments among organizations. One common feature of those …
resource sharing environments among organizations. One common feature of those …