2011
DOI: 10.1007/978-3-642-23300-5_1
|View full text |Cite
|
Sign up to set email alerts
|

Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint

Abstract: Federated Identity Management is considered a promising approach to facilitate secure resource sharing between collaborating partners. A structured survey has been carried out in order to document the benefits of adopting such systems from a user and business perspective, and also to get an indication on how Integrated Operations in the oil and gas industry can benefit from identity federations. This has resulted in a set of benefit categories grouping existing claims from researchers. The literature indicates… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0
1

Year Published

2013
2013
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(13 citation statements)
references
References 31 publications
(62 reference statements)
0
12
0
1
Order By: Relevance
“…Satisfaction: we use SATn,t (Fcsp) to denote the degree of satisfaction that other CSPs have upon the Fcsp based on its quality of services up to n transactions in the time interval t. It is computed by applying the calculation rule in equation (4).…”
Section: )mentioning
confidence: 99%
See 1 more Smart Citation
“…Satisfaction: we use SATn,t (Fcsp) to denote the degree of satisfaction that other CSPs have upon the Fcsp based on its quality of services up to n transactions in the time interval t. It is computed by applying the calculation rule in equation (4).…”
Section: )mentioning
confidence: 99%
“…According to Gartner [3], identity management is amongst the top three challenges that organizations face while moving their applications to a cloud-based model. Federated Identity Management (FIM) is the most used solution to overcome these issues; especially the cross-domain issues [2], [4], [5]. This approach simplifies the user experience by using cross-domain Single Sign-On features [5], and reduces the costs of administrating user accounts [4].…”
Section: Introductionmentioning
confidence: 99%
“…Usually different interoperability domains use independent SSO servers. As a consequence, a main security requirement is that user assertions are maintained across domains, i.e., authentication is performed locally, but assertions can be used to check identity even in a different domain (Jensen, 2011). This enhance the security of the service provider, that can perform an authorisation control (5), for example using the XACML standard process, before executing the service (6).…”
Section: The Embedded Architecturementioning
confidence: 99%
“…Thus, formal agreements are established before any interaction so that an entity could never interact with entities that are not contained in its trust list. Hence, security is achieved but the solution lacks flexibility and scalability [10][11][12]: a lot of central administration is required and so the initial setup complexity is a high barrier and may not worth adopting these procedures for a short-term collaboration.…”
Section: Motivationmentioning
confidence: 99%