scispace - formally typeset
A

Anthony Nadalin

Researcher at IBM

Publications -  78
Citations -  2955

Anthony Nadalin is an academic researcher from IBM. The author has contributed to research in topics: Access control & Computer security model. The author has an hindex of 29, co-authored 78 publications receiving 2952 citations.

Papers
More filters
Patent

Federated identity management within a distributed portal server

TL;DR: In this article, techniques for federating identity management within a distributed portal server leveraging Web services techniques and a number of industry standards are described, where identities are managed across autonomous security domains which may be comprised of independent trust models, authentication services, and user enrollment services.
Patent

Method and system for attribute exchange in a heterogeneous federated environment

TL;DR: In this paper, a system is presented for facilitating management of user attribute information at one or more attribute information providers (AIPs), which can manage the user's attribute information in accordance with userselected or administratively-determined options, including options that are stored in attribute release policies and/or dynamically determined during a transaction.

The Security Architecture for Open Grid Services

TL;DR: This document proposes a strategy for addressing security within the Open Grid Services Architecture (OGSA), and presents a set of use patterns that show how these components can be used together in a secure Grid environment.
Patent

Information handling system, method, and article of manufacture for efficient object security processing by grouping objects sharing common control access policies

TL;DR: In this paper, an object may be part of multiple object groups, and based upon an environment's policy, granting access to the object based on a single default object group or on the access granted by the union of all of its object groups.
Patent

Role-permission model for security policy administration and enforcement

TL;DR: In this article, methods, systems, and computer program products are disclosed for protecting the security of resources in distributed computing environments, and the disclosed techniques improve administration and enforcement of security policies.