Using quantified trust levels to describe authentication requirements in federated identity management
- 31 October 2008
- conference paper
- Published by Association for Computing Machinery (ACM)
Abstract
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure the interaction between different services. Although this approach guarantees scalability regarding the integration of identity-based services, it exposes a service provider to new security risks. These security risks result from the complex trust relationships within a federation. In a federation the authentication of a user is not necessarily performed within the service provider's domain, but can be performed in the user's local domain. Consequently, the service provider has to rely on authentication results received from a federation partner to enforce access control. This implies that the quality of the authentication process is out of control by the service provider and therefore becomes a factor which needs to be considered in the access control step. In order to guarantee a designated level of security, the quality of the authentication process should be part of the access control decision. To ease this process, we propose in this paper a method to rate authentication information by a level of trust which describes the strength of an authentication method. Additionally, in order to support the concept of a two-factor authentication, we also present a mathematical model to calculate the trust level when combining two authentication methods.Keywords
This publication has 10 references indexed in Scilit:
- Three measures for secure palmprint identificationPattern Recognition, 2008
- A Trust Aware Access Control in Service Oriented Grid EnvironmentPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Requirements of federated trust management for service-oriented architecturesInternational Journal of Information Security, 2007
- On the Vulnerability of Fingerprint Verification Systems to Fake Fingerprints AttacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- Analysis of Brute-Force Break-Ins of a Palmprint Authentication SystemIEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics), 2006
- Security Analysis of RFID Authentication for Pervasive Systems using Model CheckingPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- RATING: rigorous assessment of trust in identity managementPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2006
- An intrinsic assessment and comparison of biometric systems through wavelet analysisPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2004
- Choosing passwords: security and human factorsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Biometric recognition: security and privacy concernsIEEE Security & Privacy, 2003