Advertisement

FedCohesion: Federated Identity Management in the Marche Region

  • Serenella Carota
  • Flavio Corradini
  • Damiano Falcioni
  • Maria Laura Maggiulli
  • Fausto Marcantoni
  • Roberto Piangerelli
  • Alberto Polzonetti
  • Barbara Re
  • Andrea Sergiacomi
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7452)

Abstract

Federated identity management is a set of technologies and processes supporting dynamically distribute identity information. Its adoption in Public Administrations maintains organizations autonomy giving at the same time citizens support to access the services that are distributed across security domains.

In this paper, we propose the Marche Region experience for what concern federate identity management focusing on the regional authentication framework, named FedCohesion. It is bases on Security Assertion Markup Language standard and it results from Cohesion re-engineering. It is the old style legacy authentication framework. We first present resulting architecture showing supported identification process and pilot applications. Lessons learned and opportunities have been also presented.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Communication from the commission to the European Parliament, the Council, t.E.E.: Europe 2020: A european strategy for smart, sustainable and inclusive growth. Technical report, European Commission, Brussels (2010)Google Scholar
  2. 2.
    Communication from the commission to the European Parliament, the Council, t.E.E., Committee, S., the Committee of the Region: A digital agenda for europe. Technical Report 245, European Commission, Brussels (2010)Google Scholar
  3. 3.
    Communication from the commission to the European Parliament, the Council, t.E.E., Committee, S., the Committee of the Region: Delivering an area of freedom, security and justice for europe’s citizens action plan implementing the stockholm programme. Technical Report 171, European Commission, Brussels (2010)Google Scholar
  4. 4.
    Reddick, C.G.: Management support and information security: an empirical study of texas state agencies in the USA. EG 6(4), 361–377 (2009)CrossRefGoogle Scholar
  5. 5.
    European Commission: European Interoperability Framework (EIF) Towards Interoperability for European Public Services (2011)Google Scholar
  6. 6.
    Lips, M., Pang, C.: Federated identity management systems in e-government: the case of italy. Technical report, Victoria University of Wellington (2008)Google Scholar
  7. 7.
    Maler, E., Reed, D.: The venn of identity: Options and issues in federated identity management. IEEE Security & Privacy 6(2), 16–23 (2008)CrossRefGoogle Scholar
  8. 8.
    Fioravanti, F., Nardelli, E.: Identity management for e-government services. In: Digital Government. Integrated Series in Information Systems, vol. 17, pp. 331–352. Springer, US (2008)CrossRefGoogle Scholar
  9. 9.
    Baldoni, R.: Federated identity management systems in e-government: the case of Italy. Electronic Government (2012)Google Scholar
  10. 10.
    Baldoni, R., Fuligni, S., Mecella, M., Tortorelli, F.: The Italian e-Government Service Oriented Architecture: Strategic Vision and Technical Solutions. In: Proc. of 6th International EGov. Conference, pp. 79–88 (2007)Google Scholar
  11. 11.
    Baldoni, R., Fuligni, S., Mecella, M., Tortorelli, F.: The Italian e-Government Enterprise Architecture: A Comprehensive Introduction with Focus on the SLA Issue. In: Nanya, T., Maruyama, F., Pataricza, A., Malek, M. (eds.) ISAS 2008. LNCS, vol. 5017, pp. 1–12. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Uyarra, E.: What is evolutionary about ‘regional systems of innovation’? implications for regional policy. Journal of Evolutionary Economics 20, 115–137 (2010), doi:10.1007/s00191-009-0135-yCrossRefGoogle Scholar
  13. 13.
    OASIS: Security assertion markup language, SAML (2002)Google Scholar
  14. 14.
    ForumPA, CISIS: RIIR rapporto sull’innovazione nell’italia delle regioni 2010 (2010)Google Scholar
  15. 15.
    Pfitzmann, B., Waidner, M.: Federated identity-management protocols. In: Security Protocols Workshop, pp. 153–174 (2003)CrossRefGoogle Scholar
  16. 16.
    Morgan, R., Cantor, S., Carmody, S., Hoehn, W.: Federated security: The shibboleth approach. EDUCAUSE Quarterly 27(4) (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Serenella Carota
    • 2
  • Flavio Corradini
    • 1
  • Damiano Falcioni
    • 1
  • Maria Laura Maggiulli
    • 2
  • Fausto Marcantoni
    • 1
  • Roberto Piangerelli
    • 2
  • Alberto Polzonetti
    • 1
  • Barbara Re
    • 1
  • Andrea Sergiacomi
    • 2
  1. 1.Computer Science Division, School of Science and TechnologiesUniversity of CamerinoCamerinoItaly
  2. 2.P.F. Sistemi Informativi e TelematiciAnconaItaly

Personalised recommendations