Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Article type: Research Article
Authors: Goodrich, Michael T.a | Tamassia, Robertob | Yao, Danfeng (Daphne)c
Affiliations: [a] Department of Computer Science, University of California, Irvine, CA 92697, USA. E-mail: [email protected] | [b] Department of Computer Science, Providence, RI 02912, USA. E-mail: [email protected] | [c] Department of Computer Science, Rutgers University, Piscataway, NJ 08854, USA. E-mail: [email protected]
Note: [*] This work was supported in part by the National Science Foundation under grants IIS-0324846, IIS-0713403 and OCI-0724806, and by IAM Technology, Inc. The work of the first author was done primarily as a consultant to Brown University. A preliminary version of this paper appeared in Proceedings of the 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec’06), Sophia Antipolis, France, July 2006, LNCS, Vol. 4127, Springer-Verlag, Berlin–Heidelberg, 2006, pp. 133–147.
Abstract: We propose a notarized federated identity management model that supports efficient user authentication when providers are unknown to each other. Our model introduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by identity providers. An additional feature of our model is the avoidance of direct communications between identity providers and service providers, which provides improved privacy protection for users. We present an efficient implementation of our notarized federated identity management model based on the Secure Transaction Management System (STMS). We also give a practical solution for mitigating aspects of the identity theft problem and discuss its use in our notarized federated identity management model. The unique feature of our cryptographic solution is that it enables one to proactively prevent the leaking of secret identity information.
Keywords: Federated identity management, notarization, SAML, identity management, identity-based encryption
DOI: 10.3233/JCS-2008-0324
Journal: Journal of Computer Security, vol. 16, no. 4, pp. 399-418, 2008
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]