2007
DOI: 10.1002/cpe.v19:9
|View full text |Cite
|
Sign up to set email alerts
|

Untitled

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…The first and the only effort so far (to the authors best knowledge) on linking authentication LoA to authorisation decision making at run-time was made by the FAME-PERMIS (Flexible Authentication Middleware Extensions to the PERMIS) project team [www.fame-permis.org]. The project developed a software component that derives a LoA value based upon a user's authentication token presented to the authentication service, and asserts the value to a role-based access control decision engine run at the SP (Service Provider) side thus achieving LoA lined access control [9,15]. However, the software is in a very basic form; it only implements the LoA definition versus token types as defined by the NIST guideline [2].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The first and the only effort so far (to the authors best knowledge) on linking authentication LoA to authorisation decision making at run-time was made by the FAME-PERMIS (Flexible Authentication Middleware Extensions to the PERMIS) project team [www.fame-permis.org]. The project developed a software component that derives a LoA value based upon a user's authentication token presented to the authentication service, and asserts the value to a role-based access control decision engine run at the SP (Service Provider) side thus achieving LoA lined access control [9,15]. However, the software is in a very basic form; it only implements the LoA definition versus token types as defined by the NIST guideline [2].…”
Section: Related Workmentioning
confidence: 99%
“…Optionally, these data may be stored in a third party attribute directory or an attribute authority for consumptions by other relying parties. For example, the data may be sent to the attribute authority in the Shibboleth system for attribute assertion [14,15], or to the attribute authority for creating and assigning an attribute certificate.…”
Section: Authentication Loa Derivation Module (Aloa-dm)mentioning
confidence: 99%