2005
DOI: 10.1109/mc.2005.408
|View full text |Cite
|
Sign up to set email alerts
|

Federated identity management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0
2

Year Published

2008
2008
2022
2022

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 57 publications
(23 citation statements)
references
References 0 publications
0
18
0
2
Order By: Relevance
“…By sharing the information and agreeing to work together, identity providers form a "federation", thus allowing system users to identify with any identity provider belonging to the federation. Because of that, this architecture is called Federated identity management architecture [14]. Th e main advantage of the Federated identity management architecture is that it enables system to work even if the service provider and identifi cation provider are not in the same organization.…”
Section: Generic Identity Management Architectures For Single Sign-onmentioning
confidence: 99%
“…By sharing the information and agreeing to work together, identity providers form a "federation", thus allowing system users to identify with any identity provider belonging to the federation. Because of that, this architecture is called Federated identity management architecture [14]. Th e main advantage of the Federated identity management architecture is that it enables system to work even if the service provider and identifi cation provider are not in the same organization.…”
Section: Generic Identity Management Architectures For Single Sign-onmentioning
confidence: 99%
“…Using this approach, patients could link their local identities at different healthcare providers, as long as these healthcare providers are in a trust agreement [21]. The result of this linking process would be a new link between the patient's Electronic Medical Records.…”
Section: Related Workmentioning
confidence: 99%
“…The identity provider has the user information, and it is going to authenticate the user. But in this, the websites should trust each other [2]. Google, Yahoo etc.…”
Section: Introductionmentioning
confidence: 99%