The Community for Technology Leaders
Computing in the Global Information Technology, International Multi-Conference on (2007)
Gosier, Guadaloupe
Mar. 4, 2007 to Mar. 9, 2007
ISBN: 0-7695-2798-1
pp: 31
Nelly Delessy , Florida Atlantic University, USA
Eduardo B. Fernandez , Florida Atlantic University, USA
Maria M. Larrondo-Petrie , Florida Atlantic University, USA
The development of software has recently changed significantly. With the ubiquity of computing, users may need to access a wider range of applications, which may not know them in advance. Thus there is a need for dynamic trust establishment and identity exchange protocols and whatever security model is used must support these aspects. As a way to make these concepts more precise and concrete, we define architectural patterns for identity management. These patterns can then be used directly in the software development cycle, as proposed by different methodologies. The Identity Provider pattern centralizes the administration of a security domain?s subjects. The Circle of Trust pattern represents a federation of service providers that share trust relationships. The Identity Federation pattern allows to federate multiple identities across multiple organizations under a common identity. This pattern relies on the SAML Assertion pattern, which provides a unifying format for communicating identity information between different security domains.
distributed systems, identity, patterns, security, software development.

E. B. Fernandez, M. M. Larrondo-Petrie and N. Delessy, "A Pattern Language for Identity Management," Computing in the Global Information Technology, International Multi-Conference on(ICCGI), Gosier, Guadaloupe, 2007, pp. 31.
85 ms
(Ver 3.3 (11022016))