Multi-Level Security Framework for OpenID and Its Applications

被引:0
|
作者
Wei Junyin [1 ]
Zhang Mingxi [1 ]
Ding Xiangwu [1 ]
Wang Ying [2 ]
Shi Jiangping [3 ]
机构
[1] Donghua Univ, Sch Comp Sci & Technol, Shanghai, Peoples R China
[2] Shandong Inst Business & Technol, Sch Management Sci & Engn, Yantai 264005, Peoples R China
[3] Agr Resources Dev Bur, Danyang, Peoples R China
关键词
OpenID; Single Sign-On; Identity Management; Multi-Level Security; Integrity; Confidentiality;
D O I
暂无
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
As a solution to Single Sign-On (SSO), OpenID can simplify, users' operation process and reduce resource provider's overhead. Its application in the websites is becoming popular and the multi-level security of OpenID has also become a topic of concern. First the basic OpenID infrastructure is introduced, including its components, hierarchy and other key issues. A multi-level security framework for OpenID is proposed in the paper, which can solve the problem on access control of multi-level security. This framework can be applied to any rule based security model.
引用
收藏
页码:612 / 616
页数:5
相关论文
共 50 条
  • [41] Cloud Security Distributary Set (CSDS): A Policy-Based Framework to Define Multi-Level Security Structure in Clouds
    Moghaddam, Faraz Fatemi
    Wieder, Philipp
    Cemberci, Suleyman Berk
    Yahyapour, Ramin
    [J]. INTERNATIONAL CONFERENCE ON OMNI-LAYER INTELLIGENT SYSTEMS (COINS), 2019, : 74 - 79
  • [42] A Multi-level Perception Security Mode Using Virtualization
    Lou, Rui
    Jiang, Liehui
    Chang, Rui
    Wang, Yisen
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (11): : 5588 - 5613
  • [43] Multi-level Modeling of Structural Elements of Natural Language Texts and Its Applications
    Anikin, Anton
    Sychev, Oleg
    Gurtovoy, Vladislav
    [J]. BIOLOGICALLY INSPIRED COGNITIVE ARCHITECTURES 2018, 2019, 848 : 1 - 8
  • [44] MULTI-LEVEL SECURITY IN DATABASE MANAGEMENT SYSTEMS.
    Dwyer, Patricia A.
    Jelatis, George D.
    Thuraisingham, Bhavani M.
    [J]. Computers and Security, 1987, 6 (03): : 252 - 260
  • [45] Multi-level information system security in outsourcing domain
    Doomun, M. Razvi
    [J]. BUSINESS PROCESS MANAGEMENT JOURNAL, 2008, 14 (06) : 849 - 857
  • [46] Multi-level Reliable Security Mechanism Based on SpaceOS
    Liu, Hongyi
    Xuan Hao
    Liu Jingang
    [J]. PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 281 - 285
  • [47] A multi-level security model based on trusted computing
    Jia, Zhao
    Liu Ji-qiang
    Jing, Chen
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 448 - +
  • [48] Multi-Level security model in distributed database systems
    Bakir, Cigdem
    Guclu, Mehmet
    [J]. PAMUKKALE UNIVERSITY JOURNAL OF ENGINEERING SCIENCES-PAMUKKALE UNIVERSITESI MUHENDISLIK BILIMLERI DERGISI, 2022, 28 (02): : 266 - 276
  • [49] Network security audit multi-level model BrosaAudit
    School of Computer, Beijing University of Aeronautics and Astronautics, Beijing 100083, China
    [J]. Jisuanji Gongcheng, 2006, 10 (159-160+163):
  • [50] Multi-Level Security Cannot Realise NEC Objectives
    Schotanus, Harm
    Hartog, Tim
    Verkoelen, Cor
    [J]. PROCEEDINGS OF THE 11TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2012, : 244 - 249