Entity

Time filter

Source Type


Xu X.,PLA University of Science and Technology | Yang L.,China Electronic Equipments and System Engineering Corporation
Proceedings - 2011 International Conference on Instrumentation, Measurement, Computer, Communication and Control, IMCCC 2011 | Year: 2011

Since the requirements of task cooperation become more complicated and dynamic, the Federated Identity Management (FIdM) should be more safe and flexible to allow and facilitate participating federated organizations, to share information and grant or deny service access requests. Trust is the base of forming federation, and it's a novel idea to establish a security mechanism based on trust for a fair interacting environment. This paper analyzes the various trust needs in the context of FIdM, and designs a common trust model based on multi-dimensional vector which can apply to quantify multi-directional trust. At the end of essay, we present the calculation process of an example and analyze the results. © 2011 IEEE. Source


Cao Y.,National University of Defense Technology | Yang L.,China Electronic Equipments and System Engineering Corporation | Wang Y.,National University of Defense Technology
Journal of Computational Information Systems | Year: 2012

The rapid evolution of Internet applications and enterprise businesses has resulted in new requirements of Identity Management (IdM) technology such as federated domain access, trust delegation and privacy protection which can't be supported well enough under current architecture and application patterns of IdM. In addition, solutions on how to implement integration of different IdM systems, integration between IdM systems and applications must be advanced. As the core component of IdM, identity model can solve those problems while it has been well designed. In this paper, we try to do tentative work in identity model design. We first analysis the requirements of constructing a common identity model, after considering laws of identity, concepts and definitions related to identity model has been discussed, a common identity model has been bring forward based on the requirements and definitions, and the building up processes of this general identity model which includes two stages has been put out, a simple use case is given in order to verify the identity model. © 2011 by Binary Information Press. Source


Cao Y.,National University of Defense Technology | Yang L.,China Electronic Equipments and System Engineering Corporation | Fu Z.,China Electronic Equipments and System Engineering Corporation | Yang F.,China Electronic Equipments and System Engineering Corporation
Applied Mechanics and Materials | Year: 2011

This paper provides an overview of identity management architecture from the viewpoint of paradigms and models. The definition of identity management architecture has been discussed, paradigms are classified by the development stage and core design principle transmission of the architecture which include network centric paradigm, service centric paradigm, and user centric paradigm; models are grouped by components varying and functions changing to isolated model, centralized model, and federated model. These paradigms and models have no collisions among them for they are views of identity management from different viewpoint. © (2011) Trans Tech Publications. Source

Discover hidden collaborations