2007
DOI: 10.1109/msp.2007.46
|View full text |Cite
|
Sign up to set email alerts
|

Trust Negotiation in Identity Management

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
19
0

Year Published

2009
2009
2018
2018

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(19 citation statements)
references
References 2 publications
0
19
0
Order By: Relevance
“…Authentication with a trusted third-party, using either OpenID or OAuth, decreases cognitive load, but the third-party must be trusted [75]. The thirdparty may also become a single point of failure since all authentication takes place at the provider [76].…”
Section: Protocol Problemsmentioning
confidence: 99%
“…Authentication with a trusted third-party, using either OpenID or OAuth, decreases cognitive load, but the third-party must be trusted [75]. The thirdparty may also become a single point of failure since all authentication takes place at the provider [76].…”
Section: Protocol Problemsmentioning
confidence: 99%
“…Yet, it is still assumed both the end user and service provider to have a pre-established trust relationship with the Key Distribution Center (KDC) [24] presents a reputation-based trust management method that uses a single Trusted Third Party (TTP) for aggregating the IdP vote and transmitting the result to the SPs. This approach could have scalability problems since it requires to pre-configure relationships with the TTPs, a process that grows in complexity when a high number of entities exist in the system [25] and [26] propose integrating trust negotiation into IdM systems [25] includes bilateral credential disclosure techniques between SPs and between users and SPs in federated IdM, called FAMTN (Federated Attribute Management and Trust Negotiation), while [26] proposes negotiation based on matching of release policies into InfoCards, called identity meta-system. These approaches are mainly focused on flexible access control but do not deal with the establishment of dynamic trust relationships between providers.…”
Section: Outcomes Under "Nice" Conditionsmentioning
confidence: 99%
“…A typical identity management has any of the three types of trust relationship between the service provider (SP) and identity provider (IdP) -pairwise, brokered and community trust models [41,42]. In network virtualization, SeP or InP may play a role as IdP and SP.…”
Section: Authentication and Trust Managementmentioning
confidence: 99%