Sigaba’s research while affiliated with Bureau of Materials & Physical Research and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (4)


Bindings for the OASIS Security Assertion Markup Language (SAML) V2. 0–Errata Composite
  • Article

January 2006

·

65 Reads

·

6 Citations

Scott Cantor

·

Frederick

·

Hirsch

·

[...]

·

Trustgenix

Austel, IBM sstc-saml-bindings-errata-2.0-wd-021 Abstract: The SAML V2.0 Bindings specification defines protocol bindings for the use of SAML assertions and request-response messages in communications protocols and frameworks. This document, known as an "errata composite", combines corrections to reported errata with the original specification text. By design, the corrections are limited to clarifications of ambiguous or conflicting specification text. This document shows deletions from the original specification as struck-through text, and additions as blue underlined text. The "[PEnn]" designations embedded in the text refer to particular errata and their dispositions.


Bindings for the oasis security assertion markup language (SAML) V2. 0
  • Article
  • Full-text available

443 Reads

·

173 Citations

This specification defines protocol bindings for the use of SAML assertions and request-response messages in communications protocols and frameworks. Status: This is a working draft produced by the Security Services Technical Committee. See the Revision History for details of changes made in this revision.

Download

Figure 1
Figure 2
Figure 3 
Profiles for the OASIS Security Assertion Markup Language (SAML) V2. 0–Errata Composite

140 Reads

·

10 Citations

The SAML V2.0 Profiles specification defines profiles for the use of SAML assertions and request-response messages in communications protocols and frameworks, as well as profiles for SAML attribute value syntax and naming conventions. This document, known as an "errata composite", combines corrections to reported errata with the original specification text. By design, the corrections are limited to clarifications of ambiguous or conflicting specification text. This document shows deletions from the original specification as struck-through text, and additions as blue underlined text. The "[PEnn]" designations embedded in the text refer to particular errata and their dispositions. Status: The SAML V2.0 Profiles specification defines profiles for the use of SAML assertions and request-response messages in communications protocols and frameworks, as well as profiles for SAML attribute value syntax and naming conventions. This errata composite document is a working draft based on the original OASIS Standard document that had been produced by the Security Services Technical Committee and approved by the OASIS membership on 1 March 2005. While the errata corrections appearing here are non-normative, they reflect the consensus of the TC about how to interpret the specification and are likely to be incorporated into any future standards-track revision of the SAML specifications.


Citations (4)


... Its members have released a description of the IoT's privacy and security. Due to its precise and adaptive access control [6], a number of Internet standards are supported by the framework, including eXtensible Access Control Markup Language (XACML) [25] and Security Assertion Markup Language (SAML) [26], which have been developed specifically for IoT, but without addressing possible adaptations or modifications that are needed to allow them to operate within constrained environments [27]. ...

Reference:

Review Study on Blockchain Frameworks for Security Issues in IoT Devices
Assertions and protocols for the oasis security assertion markup language

... As an example, [25] surveys different theoretical models of identity systems that are still widely relevant in the cloud environment. There has also been much work on practical standards for deployments such as Kerberos (used in Microsoft Windows) [26], OICD [34], and SAML 2.0 [35], which are all widely used in enterprises as well as many universities. ...

Bindings for the oasis security assertion markup language (SAML) V2. 0

... IdPs and SSO were first explored in the context of Web interactions through the use of messages formatted with Secure Assertion Markup Language (SAML) [14] exchanged between an IdP and an RP through HTTP-based protocols, such as the Web Browser SSO Profile [13]. More recently, IdPs and RPs started to use OAuth 2.0, a protocol conceived to implement access control delegation, to allow RPs to access user identity resources maintained by an IdP. ...

Profiles for the OASIS Security Assertion Markup Language (SAML) V2. 0–Errata Composite

... This method is realistically impractical with the ever-increasing number of applications and services that need to be accessed by the user. To sort out the authentication issues numerous authentication schemes for Multi-Server Environment (MSE) have been proposed [11][12][13][14][15][16]. ...

Bindings for the OASIS Security Assertion Markup Language (SAML) V2. 0–Errata Composite
  • Citing Article
  • January 2006