{"title":"Complex federation architectures: stakes, tricks & issues","authors":"Mikaël Ates, J. Fayolle, C. Gravier, J. Lardon","doi":"10.1145/1456223.1456258","DOIUrl":null,"url":null,"abstract":"In this article, we expose the basics of distributed identity management systems and characterize what makes an identity federation architecture a singular one.\n We depict the evolutions and current trends of the interconnection of information systems by exposing what could be a global identity management system issued from the convergence of multiple identity federations.\n Thereby, we expose the expected functionalities of such an architecture and we also describe the basic distributed identity management mechanisms necessary for their deployment. Then, we discuss about privacy concerns and why some of these functionalities should be implemented carefully.","PeriodicalId":309453,"journal":{"name":"International Conference on Soft Computing as Transdisciplinary Science and Technology","volume":"51 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Conference on Soft Computing as Transdisciplinary Science and Technology","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/1456223.1456258","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
In this article, we expose the basics of distributed identity management systems and characterize what makes an identity federation architecture a singular one.
We depict the evolutions and current trends of the interconnection of information systems by exposing what could be a global identity management system issued from the convergence of multiple identity federations.
Thereby, we expose the expected functionalities of such an architecture and we also describe the basic distributed identity management mechanisms necessary for their deployment. Then, we discuss about privacy concerns and why some of these functionalities should be implemented carefully.