IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Technical Perspective of Authentication Policy Extension for the Adaptive Social Services and e-Health Care Management

Technical Perspective of Authentication Policy Extension for the Adaptive Social Services and e-Health Care Management
View Sample PDF
Author(s): Masakazu Ohashi (Chuo University, Japan), Nat Sakimura (Nomura Research Institute, Japan), Mituo Fujimoto (Nomura Research Institute, Japan), Mayumi Hori (Hakuoh University, Japan)and Noriko Kurata (Chuo University, Japan)
Copyright: 2013
Pages: 8
Source title: Handbook of Research on ICTs for Human-Centered Healthcare and Social Care Services
Source Author(s)/Editor(s): Maria Manuela Cruz-Cunha (Polytechnic Institute of Cavado and Ave, Portugal), Isabel Maria Miranda (Municipality of Guimarães, Portugal)and Patricia Gonçalves (School of Technology at the Polytechnic Institute of Cavado and Ave, Portugal)
DOI: 10.4018/978-1-4666-3986-7.ch037

Purchase


Abstract

The substantiative study of private information box project of Japanese e-Government proved the effectiveness of the New Authentication Extension Technology to combine different social infrastructures to create new Secure services between Public Sector and Private Sector (Citizen). However, there are still issues to cope with outside of the realm of technology including accountability of each participants and the level of the service, OpenID and SAML are key federated identity protocols. Both SAML and OpenID define mechanisms in support of expressing assurance information on protocol messages, Authentication Context and the Provider Authentication Policy Extension (PAPE), respectively. In deployment scenarios that require proxying from one of the protocols to the other, it becomes necessary to map to and from the corresponding assurance mechanisms. This chapter provides theoretical study of Social and e-Health Data secure exchange methodology on this mapping and related issues.

Related Content

. © 2024. 27 pages.
. © 2024. 10 pages.
. © 2024. 13 pages.
. © 2024. 6 pages.
. © 2024. 23 pages.
. © 2024. 14 pages.
. © 2024. 7 pages.
Body Bottom