Abstract
“I don’t see that [federation identity] happening this year, I don’t see it happening next year or the year after that--that leaves 2009, and I’ll leave that one open... There are a lot of issues, but basically it boils down to trust and antitrust.” [PennO6]. Despite this pessimism, federation technology and models are being deployed and are in production now, only not in those areas that they were originally expected. In this paper, we describe several adoption patterns that we have observed and the characteristics that have driven these deployments. Existing business relationships between companies are often strong enough to support federated relationships and are being used as the foundation of present-day federated identity deployments.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
[PennO6] Penn, Jonathan: Principal Analyst for Security and Identity with Forrester Research, http://www.securityfocus.com/brief/141, 2006-02-16
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2006 Friedr. Vieweg & Sohn Verlag | GWV-Fachverlage GmbH, Wiesbaden
About this chapter
Cite this chapter
Hinton, H., Vandenwauver, M. (2006). Identifying Patterns of Federation Adoption. In: ISSE 2006 — Securing Electronic Busines Processes. Vieweg. https://doi.org/10.1007/978-3-8348-9195-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-8348-9195-2_16
Publisher Name: Vieweg
Print ISBN: 978-3-8348-0213-2
Online ISBN: 978-3-8348-9195-2
eBook Packages: Computer ScienceComputer Science (R0)