Skip to main content
Top

2014 | OriginalPaper | Chapter

5. DigIdeRP Framework

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

We cover in this chapter three main areas. The first area deals with the foundations and basic concepts of service orientation and service-oriented architecture. The second one deals with a high level and detailed descriptions of DigIdeRP framework. In the last area, we present and describe each block that composes SoaML-based DigIdeRP framework.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference H. Noonan (ed.), Identity. Stanford Encyclopedia of Philosophy (2009) H. Noonan (ed.), Identity. Stanford Encyclopedia of Philosophy (2009)
3.
go back to reference G. Karjoth et al, Privacy-enabled services for enterprises, in 13th International Workshop on Database and Expert Systems Applications (DEXA’02), 2002, p. 483 G. Karjoth et al, Privacy-enabled services for enterprises, in 13th International Workshop on Database and Expert Systems Applications (DEXA’02), 2002, p. 483
4.
go back to reference T. Erl, Service-Oriented Architecture: Concepts, Technology, and Design. (Prentice Hall, New Jersey, 2005) T. Erl, Service-Oriented Architecture: Concepts, Technology, and Design. (Prentice Hall, New Jersey, 2005)
5.
go back to reference M. Benantar, Access Control Systems: Security, Identity Management and Trust Models. (Springer, Berlin, 2006) M. Benantar, Access Control Systems: Security, Identity Management and Trust Models. (Springer, Berlin, 2006)
8.
go back to reference L. Lessig, Code and Other Laws of Cyberspace. (Basic Books, New York, 2000) L. Lessig, Code and Other Laws of Cyberspace. (Basic Books, New York, 2000)
10.
go back to reference S. Vanamali, Identity management framework. Inf. Syst. Control J. 4, 49–52 (2004) S. Vanamali, Identity management framework. Inf. Syst. Control J. 4, 49–52 (2004)
11.
go back to reference C. Daeseon et al, An information security model for the next generation application service, in Proceedings of the 2nd International Workshop for Asia Public Key Infrastructure, Taipei, Taiwan, 2002 C. Daeseon et al, An information security model for the next generation application service, in Proceedings of the 2nd International Workshop for Asia Public Key Infrastructure, Taipei, Taiwan, 2002
12.
go back to reference R. Sandhu, Engineering authority and trust in cyberspace: the OM-AM and RABC way, in Proceedings of the 5th ACM Workshop on RBAC, 2000, pp. 111–119 R. Sandhu, Engineering authority and trust in cyberspace: the OM-AM and RABC way, in Proceedings of the 5th ACM Workshop on RBAC, 2000, pp. 111–119
13.
go back to reference J. Sherwood, Opening up the enterprise. Comput. Secur. J. 19, 710–719 (2000)CrossRef J. Sherwood, Opening up the enterprise. Comput. Secur. J. 19, 710–719 (2000)CrossRef
16.
go back to reference ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis, 2007 ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis, 2007
17.
go back to reference A. Jøsang, S. Pope, User-centric identity management, in Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, 2005, pp. 1–6 A. Jøsang, S. Pope, User-centric identity management, in Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, 2005, pp. 1–6
18.
go back to reference T. Varvarigou, V. Andronikou, Identity management in GRID computing and service oriented architectures: research and practice. Paper presented at the Second Multidisciplinary Workshop on Identity in the Information Society (IDIS 2009), London, UK, 2010 T. Varvarigou, V. Andronikou, Identity management in GRID computing and service oriented architectures: research and practice. Paper presented at the Second Multidisciplinary Workshop on Identity in the Information Society (IDIS 2009), London, UK, 2010
Metadata
Title
DigIdeRP Framework
Author
Ghazi Ben Ayed
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-08231-8_5