Learn More
Digital identity management intra and inter information systems, and, service oriented architectures security, are the roots of identity federation. This kind of security architectures aims at enabling information systems interoperability. Existing architectures, however, do not consider interoperability of heterogeneous federation architectures. In this(More)
—In this paper, we provide a literature review of modern remote laboratories. According to this state-of-the-art, we explain why remote laboratories are at a technological crossroad, whereas they were slugging for a decade. From various observations based on our review, we try to identify possible evolutions for the next generation of remote laboratories.(More)
—We express in this paper a position about the evolution of the high layers of the future Internet related to digital identity management. The digital identities are often wrongly considered as endpoints. We argue an Identity-Centric Internet consistent with the concepts of Identity in the Cloud and Identity as a Service. We give architectural notions and(More)
Unlinkability is a privacy feature supported by those multi-party security protocols allowing anonymous users’ credential exchanges among different organizations. Proper signature schemes, based on discrete logarithms, must be used in order to guarantee the above requirements as well as selective disclosure of information. In this paper, we highlight that(More)
In this article, we expose the basics of distributed identity management systems and characterize what makes an identity federation architecture a singular one. We depict the evolutions and current trends of the interconnection of information systems by exposing what could be a global identity management system issued from the convergence of multiple(More)
The users must face two main concerns in their digital lives, interactions and privacy, especially in identity federation architectures. Their environment and requestor client largely influence these concerns. A rich user environment issued from a user-centric vision on identity management architectures may be helpful for usability and privacy. In this(More)