Thomas, 2010 - Google Patents
Reliable Digital Identities for SOA and the WebThomas, 2010
View HTML- Document ID
- 15966312182676503843
- Author
- Thomas I
- Publication year
- Publication venue
- Proceedings of the... Ph. D. Retreat of the HPI Research School on Service-Oriented Systems Engineering
External Links
Snippet
As a basis for my research, I consider open identity management models with a particular focus on the claim-based identity management. Claim-based identity management allows services and applications to specify their identity data requirements as a list of attributes …
- 241000687904 Soa 0 title description 8
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30067—File systems; File servers
- G06F17/30129—Details of further file system functionalities
- G06F17/30144—Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/54—Store-and-forward switching systems
- H04L12/58—Message switching systems, e.g. electronic mail systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages
- H04L51/12—Arrangements for user-to-user messaging in packet-switching networks, e.g. e-mail or instant messages with filtering and selective blocking capabilities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/24—Presence management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Bertino et al. | Identity management: Concepts, technologies, and systems | |
| Bendiab et al. | WiP: A novel blockchain-based trust model for cloud identity management | |
| Alpár et al. | The identity crisis. security, privacy and usability issues in identity management | |
| EP1698993B1 (en) | Method and system for integrating multiple identities, identity mechanisms and identity providers in a single user paradigm | |
| Torres et al. | A survey on identity management for the future network | |
| US8074258B2 (en) | Obtaining digital identities or tokens through independent endpoint resolution | |
| Ghaffari et al. | Identity and access management using distributed ledger technology: A survey | |
| US20230298015A1 (en) | Systems and methods for verification of protected private information | |
| US20120278876A1 (en) | System, method and business model for an identity/credential service provider | |
| Fotiou et al. | OAuth 2.0 authorization using blockchain-based tokens | |
| Dong et al. | BBM: A blockchain-based model for open banking via self-sovereign identity | |
| WO2008099420A2 (en) | System and method to dynamically provide a contract bridge to enable control of transactions over multiple channels | |
| Grüner et al. | ATIB: Design and evaluation of an architecture for brokered self-sovereign identity integration and trust-enhancing attribute aggregation for service provider | |
| Ates et al. | An identity-centric internet: identity in the cloud, identity as a service and other delights | |
| Mohammed | Factors affecting user adoption of identity management systems: An empirical study | |
| Nabi | Comparative study on identity management methods using blockchain | |
| Schaffner | Analysis and evaluation of blockchain-based self-sovereign identity systems | |
| Thomas et al. | Distributed identity and verifiable claims using Ethereum standards | |
| Bichsel et al. | An architecture for privacy-ABCs | |
| Hovav et al. | Tutorial: identity management systems and secured access control | |
| Feulner et al. | Self-Sovereign Identity for Digital KYC | |
| Palfrey et al. | Digital identity interoperability and einnovation | |
| Simmonds | The digital identity issue | |
| Hardjono et al. | 13. Exchange Networks for Virtual Assets | |
| Thomas | Reliable Digital Identities for SOA and the Web |