Chandersekaran et al., 2009 - Google Patents
Information sharing and federationChandersekaran et al., 2009
View PDF- Document ID
- 14340056595019234739
- Author
- Chandersekaran C
- Simpson W
- Publication year
- Publication venue
- The 2nd international multi-conference on engineering and technological innovation: IMETI
External Links
Snippet
ABSTRACT Department of Defense (DoD) policy requires the Air Force to share information among authorized users both within the Air Force and across the Defense enterprise where a need and agreement are established–as the normal mode of operation for the business …
- 238000004891 communication 0 abstract description 11
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/104—Grouping of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to network resources
- H04L63/105—Multiple levels of security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7926089B2 (en) | Router for managing trust relationships | |
Erdos et al. | Shibboleth architecture draft v05 | |
Singhal et al. | Guide to secure web services | |
US8839395B2 (en) | Single sign-on between applications | |
US6668322B1 (en) | Access management system and method employing secure credentials | |
Shim et al. | Federated identity management | |
Werner et al. | Cloud identity management: A survey on privacy strategies | |
US7779248B2 (en) | Moving principals across security boundaries without service interruption | |
Alonso et al. | An identity framework for providing access to FIWARE OAuth 2.0-based services according to the eIDAS European regulation | |
Chandersekaran et al. | Claims-based enterprise-wide access control | |
Chandersekaran et al. | Information sharing and federation | |
Deng et al. | Towards a cross‐context identity management framework in e‐health | |
Marillonnet et al. | An Efficient User‐Centric Consent Management Design for Multiservices Platforms | |
Adlam et al. | Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure | |
Duan et al. | IDentiaTM-an identity bridge integrating openID and SAML for enhanced identity trust and user access control | |
Bogicevic et al. | Identity Management–A Survey | |
Singhal et al. | SP 800-95. Guide to Secure Web Services | |
Bolgouras et al. | Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era | |
Pimenta et al. | GlobaliD-Privacy Concerns on a Federated Identity Provider Associated with the Users' National Citizen's Card | |
Marillonnet et al. | Research Article An Efficient User-Centric Consent Management Design for Multiservices Platforms | |
Linkies et al. | SAP security and risk management | |
Bertino et al. | Digital identity management and trust negotiation | |
Bogićević et al. | Identity Management—A Survey | |
Hörbe | A model for privacy-enhanced federated identity management | |
Andersson et al. | Dynamic identities for flexible access control |