Proceedings of the 2nd International Conference on Information Systems Security and Privacy 2016
DOI: 10.5220/0005651702270234
|View full text |Cite
|
Sign up to set email alerts
|

Risk Management for Dynamic Metadata Exchange via a Trusted Third Party

Abstract: Inter-organizational access to IT services based on the predominant standard of Federated Identity Management (FIM), the Security Assertion Markup Language (SAML), suffers from scalability issues related to metadata exchange. In order to overcome these issues, an approach for automated metadata exchange between Identity Provider (IDP) and Service Provider (SP) via a Trusted Third Party (TTP) is presented in this article. Based on the architecture, risk management with threats and counter measures is applied by… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…To overcome the above shortcomings, DO usually utilizes a third party metadata management (TPMM) to dominate the metadata of the corresponding replications when finishing the outsourced procedures [6], [7]. As shown in Figure 1(b), DO first gets the metadata of all the replications by requesting multi-CSPs, and then sends entire metadata to a TPMM which is responsible for providing store and verification services.…”
Section: A Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…To overcome the above shortcomings, DO usually utilizes a third party metadata management (TPMM) to dominate the metadata of the corresponding replications when finishing the outsourced procedures [6], [7]. As shown in Figure 1(b), DO first gets the metadata of all the replications by requesting multi-CSPs, and then sends entire metadata to a TPMM which is responsible for providing store and verification services.…”
Section: A Motivationmentioning
confidence: 99%
“…As we elaborated before, the basic solution to ensure the reliability of the replications is to involve a TPMM to store and verify the metadata of all replications. Therefore, we compare our method with the TPMM-based scheme [7]. In the comparison experiments, we take an additional physical machine to act as the TPMM and specify that all metadata of replications need to be stored and verified by the TPMM.…”
Section: ) Comparisons With State-of-the-artmentioning
confidence: 99%