2016
DOI: 10.1007/978-3-319-55783-0_16
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Security Analysis in Federated Identity Management

Abstract: HAL is a multidisciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L'archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d'enseignement et de recherche français ou étrangers, des labora… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 29 publications
0
4
0
Order By: Relevance
“…OAuth is widely used in the current internet environment since its usability and performance are improved. However, OAuth still suffers from some security vulnerabilities [7]. Another disadvantage of the OAuth framework is that the IdP serves as a centralized identity provider, which in some situations may yield data loss.…”
Section: Identity Provider Based Platformmentioning
confidence: 99%
“…OAuth is widely used in the current internet environment since its usability and performance are improved. However, OAuth still suffers from some security vulnerabilities [7]. Another disadvantage of the OAuth framework is that the IdP serves as a centralized identity provider, which in some situations may yield data loss.…”
Section: Identity Provider Based Platformmentioning
confidence: 99%
“…Thomas Groß performed a detailed protocol-level analysis of Security Assertion Markup Language (SAML) based Single-Sign on [20]. In a survey, Simpson and Groß categorized malicious and accidental security issues in Federated Identity Management (FIM) frameworks and presented solutions to those security incidents that have been recommended by others [35].…”
Section: Related Work and Scope Of The Proposed Work A Related Workmentioning
confidence: 99%
“…There are several works dealing with threat modeling and attack surface analysis for FIDM and SSI systems. Simpson (2016) conducted a systematic FIDM security analysis survey, which categorizes security incidents that occur in FIM protocols to specify the FIDM problem landscape. Aldosary and Norah (2021) provided a comparison between FIdM architectures such as liberty alliance, security assertion markup language SAML v2.0, WS-Federation, Shibboleth, and so forth to summarize the FIDM limitations based on how it affects the user.…”
Section: Introductionmentioning
confidence: 99%
“…Aldosary and Norah (2021) provided a comparison between FIdM architectures such as liberty alliance, security assertion markup language SAML v2.0, WS-Federation, Shibboleth, and so forth to summarize the FIDM limitations based on how it affects the user. In Simpson (2016), the author not only reviews a comprehensive attack surface of attacks in FIDM, but also models the escalation of attacks, that is, how attacks on one stakeholder can cause possible attacks on other stakeholders. There is less significant work on SSI threat modeling, security analysis, and risk assessment.…”
Section: Introductionmentioning
confidence: 99%