메뉴 건너뛰기




Volumn , Issue , 2008, Pages 71-79

Using quantified trust levels to describe authentication requirements in federated identity management

Author keywords

[No Author keywords available]

Indexed keywords

ACCESS CONTROL DECISIONS; AUTHENTICATION INFORMATION; AUTHENTICATION METHODS; BUSINESS INTEGRATION; DIFFERENT SERVICES; FEDERATED IDENTITY; IDENTITY INFORMATION; IDENTITY-BASED; OUT-OF-CONTROL; SEAMLESS INTEGRATION; SECURITY ASSERTION; SECURITY RISKS; SERVICE PROVIDER; TRUST DOMAIN; TRUST LEVEL; TRUST RELATIONSHIP; TWO FACTOR AUTHENTICATION;

EID: 70349237750     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1456492.1456504     Document Type: Conference Paper
Times cited : (14)

References (33)
  • 2
    • 70349250798 scopus 로고    scopus 로고
    • Australian Government Authentication Framework for Individuals
    • Australian Government Authentication Framework for Individuals. http://www.agimo.gov.au/infrastructure/authentication/, 2008.
    • (2008)
  • 3
    • 70349248927 scopus 로고    scopus 로고
    • E-government in New Zealand
    • E-government in New Zealand. http://www.e.govt.nz, 2008.
    • (2008)
  • 6
    • 70349241139 scopus 로고    scopus 로고
    • ENISA
    • ENISA. The ENISA project page. http://www.enisa.europa.eu/, 2008.
    • (2008) The ENISA project page
  • 7
    • 70349247332 scopus 로고    scopus 로고
    • European Commission, Directorate General Enterprise, IDA
    • European Commission - Directorate General Enterprise. Interchange of Data between Administrations (IDA). http://ec.europa.eu/idabc/en/document/3532/5585.
    • Interchange of Data between Administrations
  • 9
    • 0036053761 scopus 로고    scopus 로고
    • Choosing passwords: Security and human factors
    • Jan
    • E. Gehringer. Choosing passwords: security and human factors. Technology and Society, Jan 2002.
    • (2002) Technology and Society
    • Gehringer, E.1
  • 12
    • 70349242694 scopus 로고    scopus 로고
    • The Memorability and Security of Passwords: Some Empirical Results
    • Technical Report No. 500, Computer Laboratory, University of Cambridge, Jan
    • J. Jeff, Y. Alan, B. Ross, and A. Alasdair. The Memorability and Security of Passwords: Some Empirical Results. Technical Report No. 500, Computer Laboratory, University of Cambridge, Jan 2000.
    • (2000)
    • Jeff, J.1    Alan, Y.2    Ross, B.3    Alasdair, A.4
  • 14
    • 34247499953 scopus 로고    scopus 로고
    • H. Kim, J. Oh, and J. Choi. Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. Proceedings of the 30th Annual International Computer Software and Applications Conference, Jan 2006
    • H. Kim, J. Oh, and J. Choi. Security Analysis of RFID Authentication for Pervasive Systems using Model Checking. Proceedings of the 30th Annual International Computer Software and Applications Conference, Jan 2006.
  • 15
    • 33749415612 scopus 로고    scopus 로고
    • Analysis of Brute-Force Break-Ins of a Palmprint Authentication System
    • Man and Cybernetics, Jan
    • A. Kong, D. Zhang, and M. Kamel. Analysis of Brute-Force Break-Ins of a Palmprint Authentication System. IEEE Transactions on Systems, Man and Cybernetics, Jan 2006.
    • (2006) IEEE Transactions on Systems
    • Kong, A.1    Zhang, D.2    Kamel, M.3
  • 16
    • 36849070972 scopus 로고    scopus 로고
    • Three measures for secure palmprint identification
    • Jan
    • A. Kong, D. Zhang, and M. Kamel. Three measures for secure palmprint identification. Pattern Recognition, Jan 2008.
    • (2008) Pattern Recognition
    • Kong, A.1    Zhang, D.2    Kamel, M.3
  • 17
    • 70349231839 scopus 로고    scopus 로고
    • KWINT Project
    • KWINT Project. A safer internet for all. http://www.ecp.nl/downloads/id= 43/download.html, 2007.
    • (2007) A safer internet for all
  • 18
    • 70349262911 scopus 로고    scopus 로고
    • SOA Security - Secure Cross-Organizational Service Composition
    • Stuttgart, Germany, Fraunhofer IRB-Verlag. ISBN 978-3-8167-7493-8
    • M. Menzel, I. Thomas, C. Wolter, and C. Meinel. SOA Security - Secure Cross-Organizational Service Composition. In Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007), pages 41 - 53, Stuttgart, Germany, 2007. Fraunhofer IRB-Verlag. ISBN 978-3-8167-7493-8.
    • (2007) Proceedings of the Stuttgarter Softwaretechnik Forum 2007 (SSF 2007) , pp. 41-53
    • Menzel, M.1    Thomas, I.2    Wolter, C.3    Meinel, C.4
  • 19
    • 70349242695 scopus 로고    scopus 로고
    • D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords. scs.carleton.ca.
    • D. Nali and J. Thorpe. Analyzing User Choice in Graphical Passwords. scs.carleton.ca.
  • 20
    • 22144441587 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST, FpVTE
    • National Institute of Standards and Technology (NIST). Fingerprint Vendor Technology Evaluation (FpVTE) 2003.
    • (2003) Fingerprint Vendor Technology Evaluation
  • 21
    • 27544477471 scopus 로고    scopus 로고
    • National Institute of Standards and Technology NIST
    • National Institute of Standards and Technology (NIST). Electronic Authentication Guideline, 2007.
    • (2007) Electronic Authentication Guideline
  • 22
    • 46449093648 scopus 로고    scopus 로고
    • X. Ni and J. Luo. A Trust Aware Access Control in Service Oriented Grid Environment. Sixth International Conference on Grid and Cooperative Computing, pages 417-422, 2007.
    • X. Ni and J. Luo. A Trust Aware Access Control in Service Oriented Grid Environment. Sixth International Conference on Grid and Cooperative Computing, pages 417-422, 2007.
  • 23
    • 70349230397 scopus 로고    scopus 로고
    • Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0
    • OASIS, August
    • OASIS. Security and Privacy Considerations for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Committee Draft 01, August 2004.
    • (2004) OASIS Committee Draft 01
  • 24
    • 44949218700 scopus 로고    scopus 로고
    • Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0
    • OASIS, March
    • OASIS. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. OASIS Standard Specification, March 2005.
    • (2005) OASIS Standard Specification
  • 25
    • 74049094639 scopus 로고    scopus 로고
    • Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.02
    • OASIS, March
    • OASIS. Authentication Context for the OASIS Security Assertion Markup Language (SAML) V2.02 . OASIS Standard Specification, March 2005.
    • (2005) OASIS Standard Specification
  • 29
    • 70349241138 scopus 로고    scopus 로고
    • Security analysis of smartcard to card reader communications for biometric
    • Jan
    • L. Rila and C. Mitchell. Security analysis of smartcard to card reader communications for biometric. citeseer.ist.psu.edu, Jan 2002.
    • (2002)
    • Rila, L.1    Mitchell, C.2
  • 32
    • 34548128864 scopus 로고    scopus 로고
    • Requirements of federated trust management for service-oriented architectures
    • Jan
    • Z. Wu and A. C. Weaver. Requirements of federated trust management for service-oriented architectures. International Journal of Information Security, Jan 2007.
    • (2007) International Journal of Information Security
    • Wu, Z.1    Weaver, A.C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.