Federated Identity Management for Android

被引:0
|
作者
Fongen, Anders [1 ]
机构
[1] Norwegian Defence Res Estab, Kjeller, Norway
关键词
Identity management; Android; Authentication;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A federated identity management system (IdM) must include mobile units and must provide mutual authentication for client-server connections. Existing frameworks for identity management like SAML are unlikely to apply well to resource constrained mobile terminals like Android. The contribution of this paper is an IdM with simpler data representation and protocols for identity management and authentication, which can be deployed with fewer code lines, consume less bandwidth and require less connectivity than traditional protocols, e.g., those based on SAML and WSSec. The related service invocation mechanisms is designed to support mobile services, where object methods in mobile units can be invoked from other nodes in the network, regardless the use of NAT units and firewalls.
引用
收藏
页码:77 / 82
页数:6
相关论文
共 50 条
  • [21] A Survey of Security Analysis in Federated Identity Management
    Simpson, Sean
    Gross, Thomas
    [J]. PRIVACY AND IDENTITY MANAGEMENT: FACING UP TO NEXT STEPS, 2016, 498 : 231 - 247
  • [22] Achieving Privacy in a Federated Identity Management System
    Landau, Susan
    Le Van Gong, Hubert
    Wilton, Robin
    [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2009, 5628 : 51 - 70
  • [23] Federated Identity Management (FIM): Challenges and Opportunities
    Malik, Ali Ahmad
    Anwar, Hirra
    Shibli, Muhammad Awais
    [J]. 2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 75 - 82
  • [24] User-centric privacy management for federated identity management
    Ahn, Gail-Joon
    Ko, Moonam
    [J]. 2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 187 - 195
  • [25] Identity crisis: user perspectives on multiplicity and control in federated identity management
    Satchell, C.
    Shanks, G.
    Howard, S.
    Murphy, J.
    [J]. BEHAVIOUR & INFORMATION TECHNOLOGY, 2011, 30 (01) : 51 - 62
  • [26] Cloud bursting galaxy: federated identity and access management
    Jalili, Vahid
    Afgan, Enis
    Taylor, James
    Goecks, Jeremy
    [J]. BIOINFORMATICS, 2020, 36 (01) : 1 - 9
  • [27] A Federated Digital Identity Management Approach for Business Processes
    Bertino, Elisa
    Ferrini, Rodolfo
    Musci, Andrea
    Paci, Federica
    Steuer, Kevin J.
    [J]. COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2009, 10 : 194 - +
  • [28] A USER-CENTRIC APPROACH FOR FEDERATED IDENTITY MANAGEMENT
    Bergadano, Francesco
    Accornero, Renato
    Lucisano, Giovanna
    Rispoli, Daniele
    [J]. INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY, 2013, 5 (01): : 3 - 18
  • [29] Research on Trusted Federated Identity Management and Its Application
    Liu, Lianzhong
    Gao, Junxiu
    [J]. PROCEEDINGS OF THE FIRST INTERNATIONAL WORKSHOP ON EDUCATION TECHNOLOGY AND COMPUTER SCIENCE, VOL III, 2009, : 438 - 442
  • [30] An Authentication Trust Metric for Federated Identity Management Systems
    Gomi, Hidehito
    [J]. SECURITY AND TRUST MANAGEMENT, 2011, 6710 : 116 - 131