Proceedings of the 17th International Joint Conference on E-Business and Telecommunications 2020
DOI: 10.5220/0009828401420154
|View full text |Cite
|
Sign up to set email alerts
|

An Identity-matching Process to Strengthen Trust in Federated-identity Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2021
2021

Publication Types

Select...
1

Relationship

1
0

Authors

Journals

citations
Cited by 1 publication
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…It is of utmost importance that the collected PII from different sources for one user do actually belong to that user. In order to enforce this user uniqueness, the PII may rely on several possibilities, be it either a unique official identity sources such as France Connect, or automated mapping as presented in [19].…”
Section: User Identifier Mappingmentioning
confidence: 99%
See 2 more Smart Citations
“…It is of utmost importance that the collected PII from different sources for one user do actually belong to that user. In order to enforce this user uniqueness, the PII may rely on several possibilities, be it either a unique official identity sources such as France Connect, or automated mapping as presented in [19].…”
Section: User Identifier Mappingmentioning
confidence: 99%
“…e process used to derive these pseudonyms can rely on nonreversible pseudonyms' identifier generation as presented in Chapter 8.1 in [1]. e target service then receives a pseudonym with a set of human-readable information that serves as input for the identity-matching procedure, as presented in Chapter 5 in [19].…”
Section: User Identifier Mappingmentioning
confidence: 99%
See 1 more Smart Citation