We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have built trust among each other and enable sharing of user identity information amongst themselves. Our solution supports a step by step approach according to which an individual can first establish a digital identity followed by a secure and protected use of such identity. We first introduce a flexible approach to establish a single sign-on (SSO) ID in a federation. Then we show how a user can leverage this SSO ID to establish certified and uncertified user identity attributes without the dependence on PKI for user authentication. This makes the process more usable and e...
To support emerging online activities within the digital information infrastructure, such as commerc...
Cloud federations are a new collaboration paradigm where organizations share data across their priva...
User authentication schemes have been a key research topic in the field of data security for decades...
We develop solutions for the security and privacy of user iden-tity information in a federation. By ...
International audienceWith a boom in online services generally accessed through a login/password cou...
Digital identity management (DIM) has emerged as a critical foundation for supporting successful int...
Most organizations require the verification of personal information before providing services, and t...
Recent developments in heterogeneous identity federation systems have heightened the need for the re...
Digital identity is defined as the digital representation of the information known about a specific ...
The goal of service provider federations is to support a controlled method by which distributed orga...
The identity of individuals need to be confirmed for various reasons, both in reality and on the Int...
The identity of individuals need to be confirmed for various reasons, both in reality and on the Int...
International audienceIn this article, we expose the basics of distributed identity management syste...
Authentication and authorization of a user's identity are generally done by the service providers or...
Federated identity management allows users to access mul-tiple services based on a single authentica...
To support emerging online activities within the digital information infrastructure, such as commerc...
Cloud federations are a new collaboration paradigm where organizations share data across their priva...
User authentication schemes have been a key research topic in the field of data security for decades...
We develop solutions for the security and privacy of user iden-tity information in a federation. By ...
International audienceWith a boom in online services generally accessed through a login/password cou...
Digital identity management (DIM) has emerged as a critical foundation for supporting successful int...
Most organizations require the verification of personal information before providing services, and t...
Recent developments in heterogeneous identity federation systems have heightened the need for the re...
Digital identity is defined as the digital representation of the information known about a specific ...
The goal of service provider federations is to support a controlled method by which distributed orga...
The identity of individuals need to be confirmed for various reasons, both in reality and on the Int...
The identity of individuals need to be confirmed for various reasons, both in reality and on the Int...
International audienceIn this article, we expose the basics of distributed identity management syste...
Authentication and authorization of a user's identity are generally done by the service providers or...
Federated identity management allows users to access mul-tiple services based on a single authentica...
To support emerging online activities within the digital information infrastructure, such as commerc...
Cloud federations are a new collaboration paradigm where organizations share data across their priva...
User authentication schemes have been a key research topic in the field of data security for decades...