Chandersekaran et al., 2009 - Google Patents

Information sharing and federation

Chandersekaran et al., 2009

View PDF
Document ID
14340056595019234739
Author
Chandersekaran C
Simpson W
Publication year
Publication venue
The 2nd international multi-conference on engineering and technological innovation: IMETI

External Links

Snippet

ABSTRACT Department of Defense (DoD) policy requires the Air Force to share information among authorized users both within the Air Force and across the Defense enterprise where a need and agreement are established–as the normal mode of operation for the business …
Continue reading at www.iiis.org (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/104Grouping of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • H04L63/105Multiple levels of security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection

Similar Documents

Publication Publication Date Title
US7926089B2 (en) Router for managing trust relationships
Erdos et al. Shibboleth architecture draft v05
Singhal et al. Guide to secure web services
US8839395B2 (en) Single sign-on between applications
US6668322B1 (en) Access management system and method employing secure credentials
Shim et al. Federated identity management
Werner et al. Cloud identity management: A survey on privacy strategies
US7779248B2 (en) Moving principals across security boundaries without service interruption
Alonso et al. An identity framework for providing access to FIWARE OAuth 2.0-based services according to the eIDAS European regulation
Chandersekaran et al. Claims-based enterprise-wide access control
Chandersekaran et al. Information sharing and federation
Deng et al. Towards a cross‐context identity management framework in e‐health
Marillonnet et al. An Efficient User‐Centric Consent Management Design for Multiservices Platforms
Adlam et al. Applying Blockchain Technology to Security-Related Aspects of Electronic Healthcare Record Infrastructure
Duan et al. IDentiaTM-an identity bridge integrating openID and SAML for enhanced identity trust and user access control
Bogicevic et al. Identity Management–A Survey
Singhal et al. SP 800-95. Guide to Secure Web Services
Bolgouras et al. Enabling Qualified Anonymity for Enhanced User Privacy in the Digital Era
Pimenta et al. GlobaliD-Privacy Concerns on a Federated Identity Provider Associated with the Users' National Citizen's Card
Marillonnet et al. Research Article An Efficient User-Centric Consent Management Design for Multiservices Platforms
Linkies et al. SAP security and risk management
Bertino et al. Digital identity management and trust negotiation
Bogićević et al. Identity Management—A Survey
Hörbe A model for privacy-enhanced federated identity management
Andersson et al. Dynamic identities for flexible access control