2004
DOI: 10.1016/j.cose.2004.06.013
|View full text |Cite
|
Sign up to set email alerts
|

Authentication and authorization infrastructures (AAIs): a comparative survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
55
0
4

Year Published

2005
2005
2017
2017

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 86 publications
(59 citation statements)
references
References 22 publications
0
55
0
4
Order By: Relevance
“…administrative) structure of the healthcare domain. However, there are many trust concerns associated with subordination between the participating parties in multidomain PKI infrastructures [2,10,13].…”
Section: Open Issuesmentioning
confidence: 99%
“…administrative) structure of the healthcare domain. However, there are many trust concerns associated with subordination between the participating parties in multidomain PKI infrastructures [2,10,13].…”
Section: Open Issuesmentioning
confidence: 99%
“…Therefore, authorization services are equally important. Lopez et al (2004) give examples authentication and authorization infrastructures (AAIs) in which these functionalities are going to merge.…”
Section: Public Key Infrastructuresmentioning
confidence: 99%
“…Some solutions to federate identities have been proposed, but with little support for authorization or privacy [1][2] [38]. Some integration efforts have been undertaken [36][37] such as the application of PKIs to authorization through attribute certificates [26], and the development of Privilege Management Infrastructures (PMI) [18][39], but adaptation capabilities remain limited. The agent-based PKI proposed in [28] allows different deployment topologies for TTPs, certificate formats, and protocols, and is similar to our approach, but does not address privacy.…”
Section: Related Workmentioning
confidence: 99%
“…), and often linked with "real" identifying information. Many solutions have been proposed to federate identities across multiple domains [38], but are usually not well integrated with mechanisms for effective enforcement of privileges [36].…”
Section: Introductionmentioning
confidence: 99%