Trust Federation of Identity Management in Distributed Environment

Article Preview

Abstract:

Identity management systems in Internet belong to different circles of trust and it is difficult to set up trust relationship among Identity Providers (IdPs) or Service Providers (SPs) which are located in different circles of trust. This paper proposes a distributed trust federation framework to solve the problem and its efficiency is analyzed with several experiments. It uses IdPs which belong to multiple Circles of Trust (CoTs) as relay entities to set up trust relationship among CoTs. The proposed framework is effective to extend the trust federation of identity management systems and thus improve easy of use for users in Internet..

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 605-607)

Pages:

2574-2578

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Yang Zhang and Jun-Liang Chen: IEEE transaction on services on services computing Vol. 4(1) (2011), pp.70-81.

Google Scholar

[2] Federica Paci, Rodolfo Ferrini, Andrea Musci, Kevin Steuer Jr. and Elisa Bertino: Computer Vol. 42 (5) (2009), P. 50-57.

DOI: 10.1109/mc.2009.142

Google Scholar

[3] David W. Chadwick and George Inman: Computer Vol. 42 (5) (2009), P. 33-40.

Google Scholar

[4] Mohamed Shehab, Arif Ghafoor and Elisa Bertino: IEEE transactions on parallel and distributed systems Vol 19 (10) (2008), pp.1338-1351.

DOI: 10.1109/tpds.2008.26

Google Scholar

[5] Jiexun Li, G. Alan Wang and Hsinchun Chen: Inf. Syst. Front. Vol. 13 (2011), p.101–113.

Google Scholar

[6] R. Volner and P. Boreš: Electronics and Electrical Engineering Vol 7 (95) (2009), pp.55-58.

Google Scholar

[7] Jun Hu and Liam Peyton: Mcetech (2009), p.100–112.

Google Scholar

[8] Anne V. D. M. Kayem, Patrick Martin and Selim G. Akl: Security Comm. Networks Vol. 4 (2011), p.79–94.

Google Scholar

[9] M. Hansen, A. Schwartz and A. Cooper: IEEE Security & Privacy Vol. 6 (2) (2008), pp.38-45.

Google Scholar

[10] Tong Zhou, Romit Roy Choudhury, Peng Ning and Krishnendu Chakrabarty: IEEE journal on selected areas in communication, Vol. 29 (3) (2011), pp.582-593.

Google Scholar

[11] N. Neumann and Xiaoming Fu: IEEE GLOBECOM (2008), pp.1-6.

Google Scholar

[12] Xinyi Huang, Yang Xiang, Ashley Chonka, Jianying Zhou and Robert H. Deng: IEEE transactions on parallel and distributed systems Vol. 22 (8) (2011), pp.1390-1397.

DOI: 10.1109/tpds.2010.206

Google Scholar