[go: up one dir, main page]

Gemmill, 2006 - Google Patents

A trust-relationship management framework for federated virtual organizations

Gemmill, 2006

View PDF
Document ID
4755702335990757389
Author
Gemmill J
Publication year

External Links

Snippet

Research collaborations today are virtual organizations (VO's), formed dynamically and crossing institutional and administrative boundaries. Electronic communication is essential for VO members who work at a distance and in different time zones. VO shared resources …
Continue reading at digitalcommons.library.uab.edu (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • G06Q10/105Human resources

Similar Documents

Publication Publication Date Title
Soltani et al. A Survey of Self‐Sovereign Identity Ecosystem
Lesavre et al. A taxonomic approach to understanding emerging blockchain identity management systems
Sánchez et al. Enhancing privacy and dynamic federation in IdM for consumer cloud computing
Damiani et al. Managing multiple and dependable identities
Lopez et al. Authentication and authorization infrastructures (AAIs): a comparative survey
US7926089B2 (en) Router for managing trust relationships
US20030163686A1 (en) System and method for ad hoc management of credentials, trust relationships and trust history in computing environments
Laborde et al. A user-centric identity management framework based on the W3C verifiable credentials and the FIDO universal authentication framework
Ribeiro et al. STORK: a real, heterogeneous, large-scale eID management system
Yildiz et al. A tutorial on the interoperability of self-sovereign identities
Vo et al. Identity-as-a-service: An adaptive security infrastructure and privacy-preserving user identity for the cloud environment
Bazarhanova et al. The review of non-technical assumptions in digital identity architectures
Yildiz et al. Toward interoperable self-sovereign identities
Pöhn et al. Reference Service Model Framework for Identity Management
Gemmill et al. Cross‐domain authorization for federated virtual organizations using the myVocs collaboration environment
Chadwick et al. A conceptual model for attribute aggregation
Herrera-Cubides et al. Towards the Construction of a User Unique Authentication Mechanism on LMS Platforms through Model‐Driven Engineering (MDE)
Gemmill A trust-relationship management framework for federated virtual organizations
Grubb et al. Single Sign-On and the System Administrator.
US7747850B1 (en) Automated, internet-based secure digital certificate distribution and maintenance
Winnard et al. Managing Digital Certificates Across the Enterprise
Linden Organisational and cross-organisational identity management.
Buecker et al. Federated Identity Management and Web Services Security
Zissis et al. Enhancing Security in the Integration of E-Government-The e-School Initiative.
Huda Academic document verification using SSI and blockchain technology