First International Conference on Availability, Reliability and Security (ARES'06) 2006
DOI: 10.1109/ares.2006.13
|View full text |Cite
|
Sign up to set email alerts
|

A reference model for Authentication and Authorisation Infrastructures respecting privacy and flexibility in b2c eCommerce

Abstract: Authentication and Authorisation Infrastructures (AAIs) are gaining momentum throughout the Internet. Solutions have been proposed for various scenarios among them academia, GRID computing, company networks, and above all eCommerce applications. Products and concepts vary in architecture, security features, target group, and usability containing different strengths and weaknesses. In addition security needs have changed in communication and business processes. Security on the internet is no longer defined as o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2006
2006
2019
2019

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 11 publications
0
12
0
Order By: Relevance
“…Comparative surveys on existing AAIs can be found in [10] and [17]. Schläger and Nowey [15] provide an AAI perspective focusing on risk assessment and risk identification.…”
Section: Infrastructures For Authentication and Authorisationmentioning
confidence: 99%
See 1 more Smart Citation
“…Comparative surveys on existing AAIs can be found in [10] and [17]. Schläger and Nowey [15] provide an AAI perspective focusing on risk assessment and risk identification.…”
Section: Infrastructures For Authentication and Authorisationmentioning
confidence: 99%
“…Through the integration of an attribute infrastructure and attribute-based access control (ABAC) additional functionalities are gained (see [15] and [18]). With XACML -the eXtensible Access Control Markup Language [12] -an open standard has been proposed that is able to express access policies [2].…”
Section: Introductionmentioning
confidence: 99%
“…Different architectures, research projects, and products have been analysed and motivation for the stakeholders in such infrastructures has been given. In 2006 [5] defined a process chain of security sub services an AAI is able to perform ( Figure 1). This was followed by [6] and existing AAIs were evaluated according to the chain in [5].…”
Section: Authentication and Authorisation Infrastructuresmentioning
confidence: 99%
“…In 2006 [5] defined a process chain of security sub services an AAI is able to perform ( Figure 1). This was followed by [6] and existing AAIs were evaluated according to the chain in [5]. The results were a classification and a complete assessment of best practices as well as lessons learned.…”
Section: Authentication and Authorisation Infrastructuresmentioning
confidence: 99%
See 1 more Smart Citation