Authorisation using attributes from multiple authorities

DW Chadwick - 15th IEEE International Workshops on …, 2006 - ieeexplore.ieee.org
As attribute based authorisation infrastructures such as XACML gain in popularity, linking
together user attributes from multiple attribute authorities (AAs) is becoming a pressing …

Authorisation using attribute from multiple authorities-a study of requirements

G Inman, DW Chadwick, N Klingenstein - Proceedings of HCSIT …, 2007 - kar.kent.ac.uk
This paper presents the results of a survey of requirements for attribute aggregation in
authorisation systems, gathered from an international community of security professionals. It …

[PDF][PDF] Contribution to operation support systems and service management architectures for user-centric telecommunications services over next generation networks

J Ramiro - 2009 - Citeseer
ABSTRACT Supported by Next Generation Network realizations and by Service Oriented
Architectures, the new IP-based ICT world is blurring the borders between the traditionally …

[PDF][PDF] Liberty ID-WSF Authentication, Single Sign-On, and Identity Mapping Services Specification

C Cahill, D Champagne, G Ellison, G Whitehead - 2006 - Citeseer
This specification defines an ID-WSF Authentication Protocol based on a profile of the
Simple Authentication and Security Layer (SASL) framework mapped onto ID-* SOAP-bound …

Information rich monitoring of interoperating services in privacy enabled B2B networks

L Peyton, C Doshi, J Hu… - International journal of …, 2010 - inderscienceonline.com
We examine how the Liberty Alliance framework for a privacy-enabled Business to Business
(B2B) network of interoperating services called a'Circle of Trust'(CoT) can be leveraged to …

Identity federation for voip systems

S Saklikar, S Saha - Journal of Computer Security, 2010 - content.iospress.com
Abstract Identity Federation enables Users to effectively manage their multiple Identities
spread across different administrative domains. It leverages trust between the Identity …

Identity Management and Audit Trail Support for Privacy Protection in E-Health Networks

L Peyton, J Hu - User-Driven Healthcare: Concepts, Methodologies …, 2013 - igi-global.com
E-health networks can enable integrated healthcare services and data interoperability in the
form of electronic health records accessible via Internet technology. Efficiency and quality of …

Identity Federation-Based Mobile Messaging

S Saklikar, S Saha - 2008 5th IEEE Consumer Communications …, 2008 - ieeexplore.ieee.org
This paper proposes an Identity Federation-based Mobile Messaging Framework. It
leverages the existing Identity Federation concepts, with enhancements for adapting them to …

[PDF][PDF] DE INGENIEROS DE TELECOMUNICACIÓN

JMDELÁ RAMIRO - dit.upm.es
ABSTRACT Supported by Next Generation Network realizations and by Service Oriented
Architectures, the new IP-based ICT world is blurring the borders between the traditionally …

[PDF][PDF] Liberty Technical Glossary

R Aarts, TGC Canales-Valenzuela, EP Davis, J Kemp… - 2006 - Citeseer
Liberty Technical Glossary Page 1 Liberty Alliance Project: Version: v2.0 Liberty Technical
Glossary Version: v2.0 Editors: Jeff Hodges, NeuStar, Inc. Contributors: Robert Aarts, TrustGenix …