Berbecaru et al., 2011

Type

Article

Title

Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access

Authors

Berbecaru, D., Lioy, A., Aime, M.D.

Year

2011

Harvard

Berbecaru, D., Lioy, A., Aime, M.D., 2011. Exploiting Proxy-Based Federated Identity Management in Wireless Roaming Access, in: Trust, Privacy and Security in Digital Business - 8th International Conference, TrustBus 2011 Toulouse, France,August 29 – September 2, 2011 Proceedings. pp. 13–23.

Abstract

Federated Identity Management technologies are exploited for user authentication in a number of network services but their usage may conflict with security restrictions imposed in a specific domain. We considered a specific case (roaming wireless access for guests) and extended the Stork SAML-based identity federation to cope with this problem by adding dynamic data, called meta-attributes, to be used for authorization even before the user authentication is completed. This concept may be easily extended to other data needed for trust verification and complex authorization decisions in a federated environment.


Follow us on LinkedIn | Discuss on Slack | Support us with Patreon | Sign-up for a free membership.


This wiki is owned by Open Measure, a non-profit association. The original content we publish is licensed under a Creative Commons Attribution 4.0 International License.