Mixing Heterogeneous Authentication and Authorization Infrastructures through Proxies.
Angelo FurfaroGiuseppe De MarcoPublished in: ICEIS (1) (2020)
Keyphrases
- security requirements
- access control
- trust negotiation
- security mechanisms
- data management
- security policies
- authentication scheme
- biometric authentication
- fine grained
- trust relationships
- data security
- authentication protocol
- role based access control
- role assignment
- neural network
- identity management
- image authentication
- trust management
- security analysis
- heterogeneous networks
- real world