Identity Management Model

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 16377 Experts worldwide ranked by ideXlab platform

L I Bingx - One of the best experts on this subject based on the ideXlab platform.

  • design and implementation of trust based Identity Management Model for cloud computing
    Computer Science, 2014
    Co-Authors: L I Bingx
    Abstract:

    With the development of cloud computing,Identity Management issues of cloud computing have attracted great attention.Being widely used in cloud Identity Management,the Identity authentication mechanism based on group signature guarantees that the cloud service provider cannot backtrack users' Identity information through outsourcing data,but it cannot prevent a malicious user from accessing cloud services.To solve the problem,the paper designed an Identity Management Model by integrating trust Management with group signature mechanism.The Model calculates the user's trustworthiness firstly,and then divides the users into groups according to the trustworthiness.At last,using the group signature mechanism,our Model implements the authentication,which not only ensures user privacy in cloud but also helps the cloud providers to protect cloud services.Experiments show that the Model can identify the malicious users effectively,and help the cloud service providers to prevent a malicious user from getting access to cloud services.

Dunren Che - One of the best experts on this subject based on the ideXlab platform.

  • ztimm a zero trust based Identity Management Model for volunteer cloud computing
    International Conference on Cloud Computing, 2020
    Co-Authors: Abdullah Albuali, Tessema M Mengistu, Dunren Che
    Abstract:

    The availability of efficient, affordable, green computing alternatives for emerging paradigms, such as edge, mobile, and volunteer cloud computing, is growing. But these Models are plagued by security issues, such as in volunteer cloud computing, where trust among entities is nonexistent. This paper presents a zero-trust Model that assumes no trust for any volunteer node and always verifies using a server-client Model. This paper proposes an adaptive behavior evaluation Model that estimates each VN’s trust score. Therefore, tasks are assigned to the most trusted VN in the system. A series of trust-aware mechanisms to handle VN’s life cycle is also presented.

Jun-liang Chen - One of the best experts on this subject based on the ideXlab platform.

  • Universal Identity Management Model Based on Anonymous Credentials
    2010 IEEE International Conference on Services Computing, 2010
    Co-Authors: Yang Zhang, Jun-liang Chen
    Abstract:

    The relationship-focused and credential-focused Identity Management are both user-centric notions in Service-oriented architecture (SOA). For composite services, pure user-centric Identity Management is inefficient because each sub-service may authenticate and authorize users and users need participate in every Identity provisioning transaction. If the above two paradigms are unified into the universal Identity Management Model where Identity information and privileges are delegatable, user-centricity will be more feasible in SOA. This paper aims to extend WS-Federation to build a universal Identity Management Model based on anonymous credentials, which provides the delegation of anonymous credentials and combines Identity metasystem to support easy-to-use, consistent experience and transparent security. In addition, the concept of self-generated pseudonym is introduced to construct efficient anonymous delegation Model.

Abdullah Albuali - One of the best experts on this subject based on the ideXlab platform.

  • ztimm a zero trust based Identity Management Model for volunteer cloud computing
    International Conference on Cloud Computing, 2020
    Co-Authors: Abdullah Albuali, Tessema M Mengistu, Dunren Che
    Abstract:

    The availability of efficient, affordable, green computing alternatives for emerging paradigms, such as edge, mobile, and volunteer cloud computing, is growing. But these Models are plagued by security issues, such as in volunteer cloud computing, where trust among entities is nonexistent. This paper presents a zero-trust Model that assumes no trust for any volunteer node and always verifies using a server-client Model. This paper proposes an adaptive behavior evaluation Model that estimates each VN’s trust score. Therefore, tasks are assigned to the most trusted VN in the system. A series of trust-aware mechanisms to handle VN’s life cycle is also presented.

Roberto Tamassia - One of the best experts on this subject based on the ideXlab platform.

  • notarized federated Identity Management for web services
    Lecture Notes in Computer Science, 2006
    Co-Authors: Michael T. Goodrich, Roberto Tamassia
    Abstract:

    We propose a notarized federated Identity Management Model that supports efficient user authentication when providers are unknown to each other. Our Model introduces a notary service, owned by a trusted third-party, to dynamically notarize assertions generated by Identity providers. An additional feature of our Model is the avoidance of direct communications between Identity providers and service providers, which provides improved privacy protection for users. We present an efficient implementation of our notarized federated Identity Management Model based on the Secure Transaction Management System (STMS). We also give a practical solution for mitigating aspects of the Identity theft problem and discuss its use in our notarized federated Identity Management Model. The unique feature of our cryptographic solution is that it enables one to proactively prevent the leaking of secret Identity information.