Identity Manage Interoperation Based on OpenID

被引:0
|
作者
Yu, Shaofeng [1 ]
Li, Dongmei [2 ]
Chen, Jianyong [1 ]
机构
[1] Shenzhen Univ, Dept Comp Sci & Technol, Shenzhen 518060, Peoples R China
[2] ZTE Corp, Standard Dev & Ind Relat, Shenzhen 518057, Peoples R China
关键词
Identity management; OpenID; Identity provider; Service provider;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In order to extend the trust domain that user locates, a new identity manage framework based on OpenID standards is designed to build a contact mechanism for different identity providers. It is composed of two OpenID providers and one service provider. In order to obey the OpenID standards, two proxy web applications are designed to check the validate results from OpenID providers and build contact between two of them. By this means, different OpenID providers can share user's authentication result among them and users can use a uniform identity to get more services controlled by different identity providers. The framework can evidently benefit the development of e-business.
引用
收藏
页码:360 / 367
页数:8
相关论文
共 50 条
  • [31] Plugin-based grid job management interoperation strategy
    Xu, Zhongqing
    Li, Shengli
    Wu, Song
    Shi, Xuanhua
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2006, 34 (SUPPL.): : 141 - 143
  • [32] A Directed Acyclic Graph based Detection for RBAC Based Secure Interoperation
    Chen, Xiyuan
    Zhu, Miaoliang
    2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 990 - 995
  • [33] OpenID and the Enterprise: A Model-based Analysis of Single Sign-On Authentication
    Bellamy-McIntyre, Jacob
    Luterroth, Christof
    Weber, Gerald
    15TH IEEE INTERNATIONAL ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE (EDOC 2011), 2011, : 129 - 138
  • [34] P2P Based Auction System Integrated with OpenID
    Tsai, Ching-Tsorng
    Kao, Yung-Wei
    Cheng, Ting-Wen
    Yuan, Shyan-Ming
    Chiao, Hsin-Ta
    ICCIT: 2009 FOURTH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY, VOLS 1 AND 2, 2009, : 172 - +
  • [35] Interoperation between a conventional PKI and an ID-based infrastructure
    Price, G
    Mitchell, CJ
    PUBLIC KEY INFRASTRUCTURE, 2005, 3545 : 73 - 85
  • [36] Reverse engineering legacy information systems for Internet based interoperation
    Johnson, M
    Rosebrugh, R
    IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE, PROCEEDINGS: SYSTEMS AND SOFTWARE EVOLUTION IN THE ERA OF THE INTERNET, 2001, : 32 - 39
  • [37] A Novel Secure and Privacy-Preserving Model for OpenID Connect Based on Blockchain
    Yousra, Belfaik
    Yassine, Sadqi
    Yassine, Maleh
    Said, Safi
    Lo'ai, Tawalbeh
    Salah, Khaled
    IEEE ACCESS, 2023, 11 : 67660 - 67678
  • [38] An Ontology-Based Approach for Marine Geochemical Data Interoperation
    Wang, Xiaohong
    Xu, Jianliang
    Liu, Mingtao
    Wei, Zhiqiang
    Bu, Wenrui
    Hong, Tenglong
    IEEE ACCESS, 2017, 5 : 13364 - 13371
  • [39] An User Authentication Scheme Based on the ECC and OpenID Techniques in the Internet of Things
    Lee, Jong J.
    Lee, Ki Young
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (11): : 79 - 87
  • [40] Research of interoperation model for heterogeneous. database based on Internet
    Fan, TR
    Liu, MS
    Tong, KZ
    Han, YF
    2003 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-5, PROCEEDINGS, 2003, : 2037 - 2040