Skip to main content

Enabling the Autonomic Management of Federated Identity Providers

Bailey, Christopher and Chadwick, David W. and de Lemos, Rogerio and Siu, Kristy W. S. (2013) Enabling the Autonomic Management of Federated Identity Providers. In: Emerging Management Mechanisms for the Future Internet 7th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security. Lectures Notes in Computer Science . Springer, Berlin, Germany, pp. 100-111. ISBN 978-3-642-38997-9. E-ISBN 978-3-642-38998-6. (doi:10.1007/978-3-642-38998-6_14) (The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided) (KAR id:42993)

The full text of this publication is not currently available from this repository. You may be able to access a copy if URLs are provided.
Official URL:
http://dx.doi.org/10.1007/978-3-642-38998-6_14

Abstract

The autonomic management of federated authorization infrastructures (federations) is seen as a means for improving the monitoring and use of a service provider’s resources. However, federations are comprised of independent management domains with varying scopes of control and data ownership. The focus of this paper is on the autonomic management of federated identity providers by service providers located in other domains, when the identity providers have been diagnosed as the source of abuse. In particular, we describe how an autonomic controller, external to the domain of the identity provider, exercises control over the issuing of privilege attributes. The paper presents a conceptual design and implementation of an effector for an identity provider that is capable of enabling cross-domain autonomic management. The implementation of an effector for a SimpleSAMLphp identity provider is evaluated by demonstrating how an autonomic controller, together with the effector, is capable of responding to malicious abuse.

Item Type: Book section
DOI/Identification number: 10.1007/978-3-642-38998-6_14
Uncontrolled keywords: identity management, self-adaptive authorization, federated authorization, computing security, autonomic computing
Subjects: Q Science > QA Mathematics (inc Computing science) > QA 76 Software, computer programming,
Divisions: Divisions > Division of Computing, Engineering and Mathematical Sciences > School of Computing
University-wide institutes > Institute of Cyber Security for Society
Depositing User: Rogerio de Lemos
Date Deposited: 17 Sep 2014 11:58 UTC
Last Modified: 08 Jun 2023 22:09 UTC
Resource URI: https://kar.kent.ac.uk/id/eprint/42993 (The current URI for this page, for reference purposes)

University of Kent Author Information

  • Depositors only (login required):

Total unique views for this document in KAR since July 2020. For more details click on the image.