scholarly journals Identity as a Service – Towards a Service-Oriented Identity Management Architecture

Author(s):  
Christian Emig ◽  
Frank Brandt ◽  
Sebastian Kreuzer ◽  
Sebastian Abeck
2012 ◽  
Vol 433-440 ◽  
pp. 3895-3899 ◽  
Author(s):  
Ray I Chang ◽  
Chi Cheng Chuang

Traditional NM (Network Management) techniques can not be applied on WSN (Wireless Sensor Network) due to its features of low computing ability, tiny memory space, and limited energy. A new NMA (Network Management Architecture) for WSN is needed. In this paper, we design a loosely coupled NMA of WSN based on SOA (Service-Oriented Architecture), and have well defined NM interfaces. Finally, we develop a SOA platform for WSN operations according to the NMA. Based on SOA platform, users can compose and use various NM Web Services by internet depending on their requirements. Heavy tasks which need a great deal of computing resources and storage are executed on the SOA platform. Thus, energy consumption and node computation can be decreased. Moreover, external applications use Web Services to integrate SOA platform for WSN. It lowers the difficulty in integrating different sensor platforms and heterogeneous devices.


2012 ◽  
pp. 1656-1671
Author(s):  
Athanasios Moralis ◽  
Vassiliki Pouli ◽  
Mary Grammatikou ◽  
Dimitrios Kalogeras ◽  
Vasilis Maglaris

Security in grid environments that are built using Service Oriented Architecture (SOA) technologies is a great challenge. On one hand, the great diversity in security technologies, mechanisms and protocols that each organization follows and on the other hand, the different goals and policies that these organizations adopt, comprise a complex security environment. Authenticating and authorizing users and services, identity management in a multi-organizational scenario and secure communication define the main context of the problem. In this chapter, we provide an overview of the security protocols and technologies that can be applied on a Web Service (WS) based grid environment.


2010 ◽  
Vol 40-41 ◽  
pp. 647-651 ◽  
Author(s):  
Yuan Cao ◽  
Lin Yang ◽  
Zom Bo Fu ◽  
Feng Yang

This paper provides an overview of identity management architecture from the viewpoint of paradigms and models. The definition of identity management architecture has been discussed, paradigms are classified by the development stage and core design principle transmission of the architecture which include network centric paradigm, service centric paradigm, and user centric paradigm; models are grouped by components varying and functions changing to isolated model, centralized model, and federated model. These paradigms and models have no collisions among them for they are views of identity management from different viewpoint.


Author(s):  
Ivan Milenković ◽  
Olja Latinović ◽  
Dejan Simić

Abstract: Today, identity management systems are widely used in different types of organizations, from academic and government institutions to large enterprises. An important feature of identity management systems is the Single Sign-On functionality. Single Sign-On allows users to authenticate once, and freely use all services and resources available to them afterwards. In this paper, we present the usage of Kerberos in identity management systems. An overview of Kerberos protocol, state of the art of identity management systems and different generic architectures for identity management is given in the paper. Also, we present a Single Sign-On identity management architecture proposal based on Kerberos protocol, and discuss its properties. Special attention was given to authentication, authorization and auditing.


Sign in / Sign up

Export Citation Format

Share Document