Federated identity architecture of the European eID system
J Carretero, G Izquierdo-Moreno… - IEEE …, 2018 - ieeexplore.ieee.org
Federated identity management is a method that facilitates management of identity
processes and policies among the collaborating entities without a centralized control …
processes and policies among the collaborating entities without a centralized control …
Identity federations beyond the web: A survey
A Pérez-Méndez, F Pereñíguez-García… - … Surveys & Tutorials, 2014 - ieeexplore.ieee.org
Internet service providers have, in recent years, adopted identity federation technologies
with a high degree of success. A typical Internet user will regularly use these in her daily use …
with a high degree of success. A typical Internet user will regularly use these in her daily use …
A sustainable information security framework for e-Government–case of Tanzania
CK Wangwe, MM Eloff, L Venter - Technological and Economic …, 2012 - Taylor & Francis
The government of Tanzania adopted an e-Government strategy in 2009 that is aimed at
improving efficiency in government and providing better services to citizens. Information …
improving efficiency in government and providing better services to citizens. Information …
Providing efficient SSO to cloud service access in AAA-based identity federations
The inclusion of cloud services within existing identity federations has gained interest in the
last years, as a way to simplify the access to them, reducing the user management costs …
last years, as a way to simplify the access to them, reducing the user management costs …
Out-of-band federated authentication for Kerberos based on PANA
A Pérez-Méndez, F Pereñíguez-García… - Computer …, 2013 - Elsevier
Nowadays, network operators and educational and research communities are extending the
access to their Internet application services to external end users by deploying, with other …
access to their Internet application services to external end users by deploying, with other …
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network
A Pérez-Méndez, F Pereñíguez-García… - International Journal of …, 2012 - Springer
Eduroam has become one of the main examples of network federations around the world,
where hundred of institutions allow roaming end users to access the local network if they …
where hundred of institutions allow roaming end users to access the local network if they …
Integrating an AAA‐based federation mechanism for OpenStack—the CLASSe view
A Pérez Méndez, G López Millán… - Concurrency and …, 2017 - Wiley Online Library
Identity federations enable users, service providers, and identity providers from different
organizations to exchange authentication and authorization information in a secure way. In …
organizations to exchange authentication and authorization information in a secure way. In …
[PDF][PDF] Multi-layered policy generation and management in clouds
FF Moghaddam - 2017 - core.ac.uk
The long awaited Cloud computing concept is a reality now due to the transformation of
computer generations. However, security challenges are most important obstacles for the …
computer generations. However, security challenges are most important obstacles for the …
Cross-domain authentication and interoperability scheme for federated cloud
M Gogna, C Rama Krishna - Smart Systems and IoT: Innovations in …, 2020 - Springer
Collaboration of the clouds has revolutionized the IT industry whereby different service
providers can come together with an agreement to leverage the services from each other …
providers can come together with an agreement to leverage the services from each other …
Proporcionando acceso federado y SSO a servicios de internet mediante kerberos e infraestructuras AAA= Providing federated access and SSO to internet services …
A Pérez Méndez - Proyecto de investigación:, 2015 - digitum.um.es
A día de hoy las federaciones de identidad para servicios web y para el acceso a la red
están bastante asentadas y aceptadas. Pero,¿ qué ocurre con otros tipos de servicio que no …
están bastante asentadas y aceptadas. Pero,¿ qué ocurre con otros tipos de servicio que no …