2009 Sixth International Conference on Information Technology: New Generations 2009
DOI: 10.1109/itng.2009.193
|View full text |Cite
|
Sign up to set email alerts
|

Authenticated Dictionary-Based Attribute Sharing in Federated Identity Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
10
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
3
3

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 8 publications
0
10
0
Order By: Relevance
“…The paper [34] addresses the problem of provenance and how to encrypt search while protecting confidentiality of data provenance stored in the cloud. The proposed system is capable of handling complex queries for data search, finally, the system entities do not share any keys and even if a compromised User (or Auditor) is revoked, the system would be able to perform its intended operations without requiring re-encryption.…”
Section: Related Workmentioning
confidence: 99%
“…The paper [34] addresses the problem of provenance and how to encrypt search while protecting confidentiality of data provenance stored in the cloud. The proposed system is capable of handling complex queries for data search, finally, the system entities do not share any keys and even if a compromised User (or Auditor) is revoked, the system would be able to perform its intended operations without requiring re-encryption.…”
Section: Related Workmentioning
confidence: 99%
“…Federated Cloud IDMS Federated Cloud identity management system is the realization of federated identity management model that enables the subscribers of multiple organizations to use the same identification information for acquiring access to all the networks within any particular trusted group of enterprises (Cao and Yang 2010;Chen et al 2012;Jøsang et al 2005). Federated Cloud Identity management system has received significant attention from the IT industry because of its design agility that inherently allows cross-domain access to its users by eliminating the need of creating additional user accounts for external parties (Arias-Cabarcos et al 2012;Shin et al 2009;Suriadi et al 2009). Federated IDMS follows the distributed storage architecture, where identity information is stored at multiple locations.…”
Section: Deployment Based Classificationmentioning
confidence: 99%
“…Authentication is the process of verification that ensures whether the person or the application is actually the one or who it claims to be (Jansen 2011;Pashalidis and Mitchell 2003;Shin et al 2009;Slone 2004;Subashini and Kavitha 2011;Windley 2005;You et al 2012). In the multi-tenant Cloud environment, users and computer programs are required to prove their identity/legitimacy to the authentication service whenever they attempt to access some application or while acquiring a web resource.…”
Section: Authenticationmentioning
confidence: 99%
See 1 more Smart Citation
“…One of the best known examples is based on the Merkle hash tree [6]. Recently, ADT-based approaches to designing a credential system that allows users to selectively disclose their attributes have been made in [7], [8], and they are based on skip lists [9], [10]. A skip list is a data structure that allows the effective search and update of elements within a set.…”
Section: B Selective Attribute Disclosure and Sharingmentioning
confidence: 99%