2016
DOI: 10.1504/ijeg.2016.076684
|View full text |Cite
|
Sign up to set email alerts
|

On federated single sign-on in e-government interoperability frameworks

Abstract: We consider the problem of handling digital identities within serviceoriented architecture (SOA) architectures. We explore federated, single signon (SSO) solutions based on identity managers and service providers. After an overview of the different standards and protocols, we introduce a middlewarebased architecture to simplify the integration of legacy systems within such platforms. Our solution is based on a middleware module that decouples the legacy system from the identity-management modules.We consider b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 9 publications
0
5
0
Order By: Relevance
“…SOA is not a new concept and is usually implemented to model government services and integrate them in a, e.g., service catalog (Yli-Huomo et al, 2018;Paul et al, 2012;Ma, 2010;Echevarria et al, 2015;Penna et al, 2015;Riyanto et al, 2018;Abdullah et al, 2017;Sedek et al, 2015;Tebib et al, 2015). However, due to the diversity of government agencies, a middleware component is usually implemented to ease the integration of information systems within SOA architectures (Mecca et al, 2016). Other authors implemented Platformas-a-service (PaaS), a cloud computing concept enabling service integration without the complexity of building and maintaining the infrastructure (Muller et al, 2016).…”
Section: Icts Implemented In Mature E-government Systemsmentioning
confidence: 99%
See 1 more Smart Citation
“…SOA is not a new concept and is usually implemented to model government services and integrate them in a, e.g., service catalog (Yli-Huomo et al, 2018;Paul et al, 2012;Ma, 2010;Echevarria et al, 2015;Penna et al, 2015;Riyanto et al, 2018;Abdullah et al, 2017;Sedek et al, 2015;Tebib et al, 2015). However, due to the diversity of government agencies, a middleware component is usually implemented to ease the integration of information systems within SOA architectures (Mecca et al, 2016). Other authors implemented Platformas-a-service (PaaS), a cloud computing concept enabling service integration without the complexity of building and maintaining the infrastructure (Muller et al, 2016).…”
Section: Icts Implemented In Mature E-government Systemsmentioning
confidence: 99%
“…One of the main concerns regarding SSO is the security and privacy of the system users. One of the solutions is to move all the security logic to a dedicated server to create a single authentication point for the whole system (Ma, 2010;Riyanto et al, 2018;Sedek et al, 2015;Tebib et al, 2015;Mecca et al, 2016;Setiawan et al, 2018). Another system to guarantee network security is the public key infrastructure (PKI), which is an identity authentication scheme based on digital certificates, and provides identity authentication even in the open cloud environment (Abdullah et al, 2017;Sedek et al, 2015).…”
Section: Icts Implemented In Mature E-government Systemsmentioning
confidence: 99%
“…Second, SSO authentication improves overall security from both a system architecture and a behavioural perspective. Architecturally speaking, the SSO authentication model enhances the overall security because security credentials are accepted and processed only at a specific SSO server; no security credentials are transmitted to other systems (Mecca et al 2016). Behavioural-wise, maintaining multiple passwords for different access points requires a high level of cognitive effort from users.…”
Section: Characteristics Of B2b Cloudmentioning
confidence: 99%
“…First, the developer should have knowledge in security policy and potential threats to build a threat model and also to know attacker view, how to attempt the threat model (Wang et al, 2007). The effectiveness and performance of middleware architecture and frameworks for egovernment is discussed (Mecca et al, 2016). An architecture metamodels and security risk can be inferred from metamodel instantiations.…”
Section: Related Workmentioning
confidence: 99%