Skip to main content

Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems

  • Conference paper
Next Generation Society. Technological and Legal Issues (e-Democracy 2009)

Abstract

The impressing penetration rates of electronic and mobile networks provide the unique opportunity to organizations to provide advanced e/m-services, accelerating their entrance in the digital society, and strengthening their fundamental structure. Service Oriented Architectures (SOAs) is an acknowledged promising technology to overcome the complexity inherent to the communication among multiple e-business actors across organizational domains. Nevertheless, the need for more privacy-aware transactions raises specific challenges that SOAs need to address, including the problems of managing identities and ensuring privacy in the e/m-environment. This article presents a targeted, user-centric scalable and federated Identity Management System (IAM), calledSecIdAM, and a mobile framework for building privacy-aware, interoperable, and secure mobile applications with respect to the way that the trust relationship among the involved entities, users and SOAs, is established. Finally, it analyzes a user-transparent m-process for obtaining an authentication and authorization token, issued from the SecIdAM as integrated in the IST European programme SWEB for the public sector.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bertino, E., Martino, L.D.: A Service-oriented Approach to Security - Concepts and Issues. In: Eighth International Symposium on Autonomous Decentralized Systems, ISADS 2007, Sedona USA, pp. 7–16 (2007)

    Google Scholar 

  2. Peyton, L., Doshi, C., Seguin, P.: An audit trail service to enhance privacy compliance in federated identity management. In: Proceedings of the 2007 conference of the center for advanced studies on Collaborative research, CASCON 2007, pp. 175–187. ACM, Ontario (2007)

    Chapter  Google Scholar 

  3. Kaliontzoglou, A., Sklavos, P., Karantjias, T., Polemi, D.: A secure e-Government platform architecture for small to medium sized public organizations. Electronic Commerce Research & Applications 4(2), 174–186 (2005)

    Article  Google Scholar 

  4. Liberty Alliance. Liberty ID-WSF Web Services Framework Overview, version 2.0 specifications, http://www.projectliberty.org

  5. Papastergiou, S., Karantjias, A., Polemi, D.: A Federated Privacy-Enhancing Identity Management System (FPE-IMS). In: Proceedings of the 18th Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communications, Athens (2007)

    Google Scholar 

  6. Lockhart, H., et al.: Web Services Federation Language (WS-Federation). Version 1.1 (December 2007)

    Google Scholar 

  7. SWEB IST project, Secure, interoperable, cross border m-services contributing towards a trustful European cooperation with the non-EU member Western Balkan countries, Sixth Framework Programme, IST-2006-2.6.5, http://www.sweb-project.org

  8. Liberty Alliance Project, Liberty Alliance & WS-Federation: A Comparative Overview (2003), http://www.projectliberty.org/resources%20/whitepapers/

  9. Goodner, M., et al.: Understanding WS-Federation, version 1.0 (2007)

    Google Scholar 

  10. PRIME Project, Privacy and Identity Management for Europe, European R&D Integrated Project under the FP6/IST Programme (2005), http://www.prime-project.eu.org

  11. Meints, M., et al.: D3.1: Structured Overview on Prototypes and Concepts of Identity Management Systems (2005), http://www.fidis.net/fileadmin/fidis/deliverables%20/fidis-wp3-del3.1.overview_on_IMS.final.pdf

  12. Rieger, S., Neumair, B.: Towards usable and reasonable Identity Management in hererogeneous IT infrastructures. In: 10th IFIP/IEEE International Symposium on Integrated Network Management – IM 2007, Munich, pp. 560–574 (2007)

    Google Scholar 

  13. Corradini, F., et al.: The e-Government digital credentials. International Journal of Electronic Governance (IJEG) 1(1), 17–37 (2007), http://www.inderscience.com/filter.php?aid=14341

    Article  Google Scholar 

  14. Haddad, W.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology. Network Working Group, IETF Trust (2008)

    Google Scholar 

  15. Directive, Directive 97/66/EC of the European Parliament and of the Council of 15th December 1997 concerning the processing of personal data and the protection of privacy in the telecommunications sector. Official Journal L L 024, 0001– 0008 (1997)

    Google Scholar 

  16. Directive, Directive 01/45/EC of the European Parliament and the Council of Ministers on the protection of individuals with regard to the processing of personal data by the Community institutions and bodies and on the free movement of such data. Official Journal L 008, 0001– 0022 (2001)

    Google Scholar 

  17. SAML, Security Assertion Markup Language v.2.0 – Technical Overview. Working Draft 1.0 (2006), http://www.oasis-open.org

  18. OASIS WSFED Technical Committee, Web Services Federation Language Version 1.2, OASIS, Working Draft (2008)

    Google Scholar 

  19. Pasley, J.: How BPEL and SOA Are Changing Web Services Development. IEEE Internet Computing 9(3), 60–67 (2005)

    Article  Google Scholar 

  20. Mule Technical Committee, “Mule 2.0”, Release Candidate 2 (2008), http://mule.mulesource.org

  21. OASIS Web Service Secure Exchange Technical Committee, OASIS WS-Trust 1.3, OASIS Standard (2007)

    Google Scholar 

  22. SWEB consortium, D4.1: SWEB platform development report, European Commission, Belgium (2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Karantjias, A., Polemi, N. (2010). Core Structure Elements Architectures to Facilitate Construction and Secure Interconnection of Mobile Services Frameworks and Advanced IAM Systems. In: Sideridis, A.B., Patrikakis, C.Z. (eds) Next Generation Society. Technological and Legal Issues. e-Democracy 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 26. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-11631-5_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-11631-5_13

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-11629-2

  • Online ISBN: 978-3-642-11631-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics