A multi-domain role activation model

  title={A multi-domain role activation model},
  author={V. Abreu and A. Santin and E. Viegas and Maicon Stihler},
  journal={2017 IEEE International Conference on Communications (ICC)},
  • V. Abreu, A. Santin, +1 author Maicon Stihler
  • Published 2017
  • Computer Science
  • 2017 IEEE International Conference on Communications (ICC)
  • Organizations establish partnerships in order to achieve a strategic goal. In many cases, resources in a given organization are accessed from external domains, characterizing multi-domain operations. This paper presents an approach to perform role activation in multi-domain environments. The active roles are imported in other domains from a user's home domain. Thus, a Single Role Activation (SRA) is performed, similarly to Single Sign-On (SSO) authentication. The administrative autonomy to… CONTINUE READING
    5 Citations


    lightweight decentralized authorization model for inter-domain collaborations
    • 25
    Unraveling decentralized authorization for multi-domain collaborations
    • H. Lee
    • Computer Science
    • 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)
    • 2007
    • 8
    dRBAC: distributed role-based access control for dynamic coalition environments
    • 237
    • PDF
    Proposed NIST standard for role-based access control
    • 2,536
    • PDF
    Inter-domain role based access control using ontology
    • 10
    Secure interoperation in a multidomain environment employing RBAC policies
    • 201
    • Highly Influential
    • PDF
    Supporting Ad-hoc Collaboration with Group-based RBAC Model
    • Q. Li, X. Zhang, Sihan Qing, M. Xu
    • Computer Science
    • 2006 International Conference on Collaborative Computing: Networking, Applications and Worksharing
    • 2006
    • 10
    • PDF
    Access-control language for multidomain environments
    • 164
    • PDF
    Integral Federated Identity Management for Cloud Computing
    • 41
    A survey of Identity Management technology
    • Y. Cao, L. Yang
    • Computer Science
    • 2010 IEEE International Conference on Information Theory and Information Security
    • 2010
    • 60