Identity Manage Interoperation Based on OpenID

被引:0
|
作者
Yu, Shaofeng [1 ]
Li, Dongmei [2 ]
Chen, Jianyong [1 ]
机构
[1] Shenzhen Univ, Dept Comp Sci & Technol, Shenzhen 518060, Peoples R China
[2] ZTE Corp, Standard Dev & Ind Relat, Shenzhen 518057, Peoples R China
关键词
Identity management; OpenID; Identity provider; Service provider;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to extend the trust domain that user locates, a new identity manage framework based on OpenID standards is designed to build a contact mechanism for different identity providers. It is composed of two OpenID providers and one service provider. In order to obey the OpenID standards, two proxy web applications are designed to check the validate results from OpenID providers and build contact between two of them. By this means, different OpenID providers can share user's authentication result among them and users can use a uniform identity to get more services controlled by different identity providers. The framework can evidently benefit the development of e-business.
引用
收藏
页码:360 / 367
页数:8
相关论文
共 50 条
  • [21] Can Europe's governments manage identity?
    Seltsikas, P
    BT TECHNOLOGY JOURNAL, 2005, 23 (04) : 80 - 88
  • [22] A security violation detection method for RBAC based interoperation
    Chen Xiyuan
    Di, Wu
    Jian, Li
    Zhu Miaoliang
    2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1491 - 1496
  • [23] Ontology based hybrid access control for automatic interoperation
    Sun, Yuqing
    Pan, Peng
    Leung, Ho-fung
    Shi, Bin
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 323 - +
  • [24] Commitment-based interoperation for e-commerce
    Xing, J
    Wan, F
    Rustogi, SK
    Singh, MP
    5TH INTERNATIONAL SYMPOSIUM ON AUTONOMOUS DECENTRALIZED SYSTEMS, PROCEEDINGS, 2001, : 161 - 168
  • [25] On Role Mappings for RBAC-based Secure Interoperation
    Hu, Jinwei
    Li, Ruixuan
    Lu, Zhengding
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 270 - 277
  • [26] A commitment-based approach for business process interoperation
    Xing, J
    Wan, F
    Rustogi, SK
    Singh, MP
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2001, E84D (10) : 1324 - 1332
  • [27] Post-Quantum Electronic Identity: Adapting OpenID Connect and OAuth 2.0 to the Post-Quantum Era
    Schardong, Frederico
    Giron, Alexandre Augusto
    Mueller, Fernanda Larisa
    Custodio, Ricardo
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2022, 2022, 13641 : 371 - 390
  • [28] Identity Management in E-Health: A Case Study of Web of Things application using OpenID Connect
    Domenech, Marlon Cordeiro
    Comunello, Eros
    Wangham, Michelle Silva
    2014 IEEE 16TH INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES (HEALTHCOM), 2014, : 219 - 224
  • [29] Rule-based metadata interoperation in heterogeneous digital libraries
    Ding, Hao
    Solvberg, Ingeborg
    ELECTRONIC LIBRARY, 2007, 25 (02): : 193 - 206
  • [30] Trust and role based access control for secure interoperation ("TracSI")
    Phoomvuthisam, Suronapee
    2007 INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES, VOLS 1-3, 2007, : 1458 - 1463