A network access control approach based on the AAA architecture and authorization attributes

G López, O Cánovas, AF Gómez, JD Jiménez… - Journal of Network and …, 2007 - Elsevier
Network access control mechanisms constitute an increasingly needed service, when
communications are becoming more and more ubiquitous thanks to some technologies such …

Delegation of access rights in multi-domain service compositions

L Bussard, A Nano, U Pinsdorf - Identity in the Information Society, 2009 - Springer
Today, it becomes more and more common to combine services from different providers into
one application. Service composition is however difficult and cumbersome when there is no …

A heterogeneous network access service based on PERMIS and SAML

G López, Ó Cánovas, AF Gómez-Skarmeta… - Public Key Infrastructure …, 2005 - Springer
The expansion of inter-organizational scenarios based on different authorization schemes
involves the development of integration solutions allowing different authorization domains to …

using microsoft office infopath to generate XACML policies

M Sanchez, G Lopez, AF Gómez-Skarmeta… - E-Business and …, 2008 - Springer
Today, when organizations perform access control over their resources they are not only
interested in the user's identity, but in other data such as user's attributes or contextual …

A model for authentication credentials translation in service oriented architecture

ER De Mello, MS Wangham, J da Silva Fraga… - … Science IV: Special …, 2009 - Springer
Due to the increasing number of service providers, the grouping of these providers following
the federation concept and the use of the Single Sign On (SSO) concept are helping users to …

Extensible Model and Policy Engine for Usage Control and Policy-Based Governance: Industrial Applications

A Hariri - 2024 - iris.unitn.it
The main focus of this thesis is applied research targeting industrial applications of Usage
Control (UCON) and policy-based governance. Nonetheless, we also tackle an associated …

Extending the common services of edugain with a credential conversion service

G López, Ó Cánovas, DR Lopez… - … –ESORICS 2007: 12th …, 2007 - Springer
We are experiencing the emergence of federated approaches to resource sharing. In these
approaches, trust links are established among different autonomous organizations in order …

Architektur und Werkzeuge für dynamisches Identitätsmanagement in Föderationen

D Pöhn - 2016 - edoc.ub.uni-muenchen.de
Abstract Federated Identity Management (FIM) hat die Motivation, Identitätsdaten eines
Benutzers von einer Heimatorganisation, dh Identity Provider (IdP), einem Dienstbetreiber …

An access control system for multimedia content distribution

M Sánchez, G López, Ó Cánovas, JA Sánchez… - European Public Key …, 2006 - Springer
Multimedia content distribution has appeared as a new growth market offered by network
providers, defining resource access infrastructures able to support both wired and wireless …

[PDF][PDF] A proposal for extending the eduroam infrastructure with authorization mechanisms

M Sánchez, G López, O Cánovas… - … Workshop on Security …, 2007 - scitepress.org
Identity federations are emerging in the last years in order to make easier the deployment of
resource sharing environments among organizations. One common feature of those …