Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation

Détails

ID Serval
serval:BIB_C713456DFB32
Type
Actes de conférence (partie): contribution originale à la littérature scientifique, publiée à l'occasion de conférences scientifiques, dans un ouvrage de compte-rendu (proceedings), ou dans l'édition spéciale d'un journal reconnu (conference proceedings).
Collection
Publications
Institution
Titre
Processes View Modeling of Identity-related Privacy Business Interoperability: Considering User-Supremacy Federated Identity Technical Model and Identity Contract Negotiation
Titre de la conférence
2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Auteur⸱e⸱s
Ayed G. B., Ghernaouti-Helie S.
Editeur
Institute of Electrical and Electronics Engineers (IEEE)
ISBN
978-1-4673-2497-7
978-0-7695-4799-2
Statut éditorial
Publié
Date de publication
08/2012
Pages
906-913
Langue
anglais
Résumé
Federated identity is a distributed system that is deployed across multiple parties. Service providers still hold the absolute power over people identities. So, identity-related privacy is considered as a mean to entrench subjects' control over identities and foster trust among multiple involved parties. Thus, identity-related privacy should interoperable, which can be guaranteed through the capture of requirements from different polices related to identity. In this article, we provide and explain a BPMN processes view of the requirements allowing them to be ready to-implement, clear, easy to-understand by each party wishing to collaborate within or across federated identity systems. We highlight that present-day practitioners should be able to translate requirements with user-supremacy federated identity technical model concepts into a set of rules and take into consideration details of identity contract negotiation in order to successfully deliver processes view. BPMN collaboration and choreography diagrams are used to describe seven processes and a sub-process, which would provide a useful way to gain alignment between requirements and IT.
Mots-clé
BPMN, federated identity, privacy processes, user-centric, user-supremacy
Web of science
Création de la notice
27/03/2017 11:37
Dernière modification de la notice
20/08/2019 16:42
Données d'usage