Federated identity as capabilities

H Halpin, B Cook - Annual Privacy Forum, 2012 - Springer
capabilities-based approach to federated identity that posits identity to be a set of capabilities
that a user can prove to a service that they possess, such as possession of the capability to …

Federated identity management and interoperability for heterogeneous cloud platform ecosystems

N Selvanathan, D Jayakody… - Proceedings of the 14th …, 2019 - dl.acm.org
… and implementing a federated identity management and … with each other and offer their
capabilities to the user communities of … Thus, finding the best solution for the federated identity

A federated capability-based access control mechanism for internet of things (iots)

R Xu, Y Chen, E Blasch, G Chen - Sensors and Systems for …, 2018 - spiedigitallibrary.org
… In this paper, we propose a federated capability-… identity-based capability token management
strategy is presented and the authorization delegation mechanism is illustrated. A capability

Capability-based access control delegation model on the federated IoT network

B Anggorojati, PN Mahalle, NR Prasad… - The 15th International …, 2012 - ieeexplore.ieee.org
federated identity management environment [2], [3], and also challenges in cross-domain
delegation by specifically using capability- … based on dynamic capability propagation suited for …

Adding federated identity management to openstack

DW Chadwick, K Siu, C Lee, Y Fouillat… - Journal of Grid …, 2014 - Springer
… Thus it is limited in its federated identity management capabilities. The EGI-InSPIRE
project represents an existing, operational Grid that is incorporating cloud software …

An integrated approach to federated identity and privilege management in open systems

R Bhatti, E Bertino, A Ghafoor - Communications of the ACM, 2007 - dl.acm.org
federated identity mechanisms and their integration with privilege management mechanisms.
We also present an integrated approach to federated identity … the identities or capabilities

Federated identity and access management for the internet of things

P Fremantle, B Aziz, J Kopecký… - … Workshop on Secure …, 2014 - ieeexplore.ieee.org
… of OAuth or other similar protocols, as well as the capabilities of OAuth implementations. …
paper, we have shown that a standardized federated, dynamic, user-directed authentication and …

Towards a Federated Identity and Access Management Across Universities

J Alsulami - 2021 - commons.erau.edu
… new identities for the users. In this thesis, we propose Federated Identity Management (FIM) …
associates without creating new identities. We provide a comprehensive literature survey of …

UnlimitID: Privacy-preserving federated identity management using algebraic MACs

M Isaakidis, H Halpin, G Danezis - Proceedings of the 2016 ACM on …, 2016 - dl.acm.org
… OAuth can be interpreted as a capabilities-based system, where the authorized access …
as a capability to access attributes [5]. It is not necessary to link capabilities to a single identity. …

Federated identity management

J Camenisch, B Pfitzmann - Security, Privacy, and Trust in Modern Data …, 2007 - Springer
… his or her identity supplier S and get careless in using the browser capabilities to verify that
… sign-on, where the identity supplier uses a part of the identity consumer’s window, because …