A Federated Digital Identity Management Approach for Business Processes

被引:0
|
作者
Bertino, Elisa [1 ]
Ferrini, Rodolfo [1 ]
Musci, Andrea [1 ]
Paci, Federica [1 ]
Steuer, Kevin J. [1 ]
机构
[1] Purdue Univ, CS Dept, W Lafayette, IN 47907 USA
关键词
identity management; business process; naming heterogeneity; interoperability;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Business processes have gained a lot of attention because of the pressing need for integrating existing resources and services to better fulfill customer needs. A key feature of business processes is that they are built from composable services, referred to as component services, that may belong to different domains. In such a context, flexible multi-domain identity management solutions are crucial for increased security and user-convenience. In particular, it is important that during the execution of a business process the component services be able to verify the identity of the client to check that it has the required permissions for accessing the services. To address the problem of multi-domain identity management, we propose a multi-factor identity attribute verification protocol for business processes that assures clients privacy and handles naming heterogeneity.
引用
收藏
页码:194 / +
页数:2
相关论文
共 50 条
  • [41] A Review of Federated Identity Management of OpenStack Cloud
    Shere, Rohit
    Srivastava, Sonika
    Pateriya, R. K.
    2017 INTERNATIONAL CONFERENCE ON RECENT INNOVATIONS IN SIGNAL PROCESSING AND EMBEDDED SYSTEMS (RISE), 2017, : 516 - 520
  • [42] Ensuring information assurance in federated identity management
    Shin, D
    Ahn, GJ
    Shenoy, P
    CONFERENCE PROCEEDINGS OF THE 2004 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2004, : 821 - 826
  • [43] Application of Federated Identity Management in ERP System
    Guo, Chunfang
    Wang, Ying
    IEEE/SOLI'2008: PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS, VOLS 1 AND 2, 2008, : 1971 - 1974
  • [44] Processes View Modeling of Identity-related Privacy Business Interoperability Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation
    Ben Ayed, Ghazi
    Ghernaouti-Helie, Solange
    2012 IEEE/ACM INTERNATIONAL CONFERENCE ON ADVANCES IN SOCIAL NETWORKS ANALYSIS AND MINING (ASONAM), 2012, : 906 - 913
  • [45] Federated Identity Management (FIM): Challenges and Opportunities
    Malik, Ali Ahmad
    Anwar, Hirra
    Shibli, Muhammad Awais
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 75 - 82
  • [46] An approach to knowledge management support in e-business processes
    Slembek, I
    TOWARDS THE E-SOCIETY: E-COMMERCE, E-BUSINESS, AND E-GOVERNMENT, 2001, 74 : 473 - 482
  • [47] Management of Business Processes
    Surkova E.V.
    Mazhaiskii Y.A.
    Russian Engineering Research, 2022, 42 (3) : 292 - 294
  • [48] Management of Business Processes
    Surkova, E.V.
    Mazhaiskii, Yu. A.
    Russian Engineering Research, 2022, 42 (03) : 292 - 294
  • [49] User-centric privacy management for federated identity management
    Ahn, Gail-Joon
    Ko, Moonam
    2007 INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING, 2008, : 187 - 195
  • [50] A promising approach to supporting knowledge-intensive business processes: Business case management
    Panian, Zeljko
    World Academy of Science, Engineering and Technology, 2011, 75 : 642 - 648