DW Chadwick, G Inman, N Klingenstein - Future Generation Computer …, 2010 - Elsevier
This paper describes a conceptual model for attribute aggregation that allows a service provider (SP) to authorise a user's access request based on attributes asserted by multiple …
DJ Lutz, B Stiller - IEEE Communications Surveys & Tutorials, 2013 - ieeexplore.ieee.org
Identity Federations are increasingly being used to establish convenient and secure attribute- based authentication and authorization systems. Whilst this process began mainly in the …
MAM Llorente, JMDÁ Ramiro, BSM González… - US Patent …, 2014 - Google Patents
BACKGROUND In telecommunications and computer networks, an identity network includes a plurality of service providers and an iden tity provider, forming what is sometimes called a …
C Cahill, D Champagne, G Ellison, G Whitehead - 2006 - Citeseer
This specification defines an ID-WSF Authentication Protocol based on a profile of the Simple Authentication and Security Layer (SASL) framework mapped onto ID-* SOAP-bound …
S Callahan, J Dashevsky, S Kellomäki, S Walker… - 2007 - researchgate.net
This document has been prepared by Sponsors of the Liberty Alliance. Permission is hereby granted to use the 2 document solely for the purpose of implementing the Specification. No …
D Champagne, G Gourmelen, F Telecom, J Kemp… - 2006 - Citeseer
It is often necessary for providers of identity-based web services to interact with principsls (eg the owners of the identity data exposed by such services or the individuals on whose …