Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

Contents 9
References
2.2.4 Revocation
2.2.5 Governance
2.3 Identity Assurance
Fundamental Technologies and Processes
3.1 Credentials
3.1.1 Basic Concepts
3.1.2 Public-Key Certificates and Public-Key Infrastructures
3.1.3 Attribute and Authorization Certificates
3.1.4 Credential Delegation
3.1.5 Proxy Certificates
3.2 Single Sign-On
3.2.1 Kerberos Protocols
3.2.2 Reverse Proxy-Based SSO
3.3 Attribute Federation
3.3.1 Distributed Mediation
3.3.2 Single Party–Based Mediation
3.4 Privacy
3.4.1 Pseudonym Systems
3.4.2 Anonymous Credentials
3.5 Assurance and Compliance
4.2.2 Specification Structure
4.2.3 Web SSO
4.2.4 Use Cases
4.3 Liberty Identity Web Services Framework
4.3.1 Opt-In Discovery Registration
4.3.2 Dynamic Acquisition of Consent from Subjects
4.3.3 Federated Identity-Based Access Control
4.3.4 Pseudonym Mapping
4.3.5 Use Cases
4.4 OpenID
4.4.1 Overview
4.4.2 Authentication
4.4.3 Attribute Exchange (AX)
4.4.4 Provider Authentication Policy Extension (PAPE)
4.4.5 Simple Registration (SREG)
4.4.6 Use Cases
4.5.1 Overview
4.5.2 WS-MetadataExchange
4.5.3 WS-Trust
4.5.4 Use Cases
4.6.1 Use Cases
4.7 Security Analysis
4.7.1 Confidentiality
4.7.2 Integrity
4.7.3 Availability
4.7.4 Repudiation
4.7.5 Authentication
4.7.6 Authorization
4.8 Privacy Analysis
4.9 Research Prototypes
4.9.1 SASSO
4.9.2 VeryIDX
4.9.3 SWIFT
Challenges
5.1 Usability
5.1.1 Usability Principles and Requirements
5.1.3 Antiphishing Measures
5.2 Access Control
5.3 Privacy Protection
5.3.1 Privacy Policies
5.3.3 Privacy Protection in Emerging Services
5.4 Trust Management
5.4.1 Reputation of the Party
5.4.4 Trust in the Context of Identity Management
5.5 Interoperability Challenge
5.5.1 Universal User Experiences
5.5.2 Naming Heterogeneity Management
5.6 Biometrics
0 of .
Results for:
No results containing your search query
P. 1
Identity Management - Concepts, Technologies, And Systems

Identity Management - Concepts, Technologies, And Systems

Ratings: (0)|Views: 285 |Likes:
Published by Leopoldo Mauro

More info:

Published by: Leopoldo Mauro on Jun 22, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

06/16/2012

pdf

text

original

You're Reading a Free Preview
Pages 4 to 74 are not shown in this preview.
You're Reading a Free Preview
Pages 81 to 92 are not shown in this preview.
You're Reading a Free Preview
Pages 96 to 108 are not shown in this preview.
You're Reading a Free Preview
Pages 112 to 198 are not shown in this preview.

Activity (3)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
windua liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->