{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:10:48Z","timestamp":1750306248008,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,3,29]],"date-time":"2017-03-29T00:00:00Z","timestamp":1490745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,3,29]]},"DOI":"10.1145\/3090354.3090391","type":"proceedings-article","created":{"date-parts":[[2017,7,31]],"date-time":"2017-07-31T12:10:27Z","timestamp":1501503027000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Toward Interoperability Approach between Federated Systems"],"prefix":"10.1145","author":[{"given":"Hasnae","family":"L'Amrani","sequence":"first","affiliation":[{"name":"ENSIAS, Mohamed V University, Morocco"}]},{"given":"Badr Eddine","family":"Berroukech","sequence":"additional","affiliation":[{"name":"ENSIAS, Mohamed V University, Morocco"}]},{"given":"Youn\u00e8s","family":"El Bouzekri El Idrissi","sequence":"additional","affiliation":[{"name":"ENSAK, Ibn Tofail University, Morocco"}]},{"given":"Rachida","family":"Ajhoun","sequence":"additional","affiliation":[{"name":"ENSIAS, Mohamed V University, Morocco"}]}],"member":"320","published-online":{"date-parts":[[2017,3,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Identity Management Systems: Laws of Identity for Models' Evaluation IEEE Cist'16","author":"L'Amrani H.","year":"2016","unstructured":"H. L'Amrani, B.E. Berroukech, Y. El Bouzekri El Idrissi, R. Ajhoun, Identity Management Systems: Laws of Identity for Models' Evaluation IEEE Cist'16, October 2016."},{"key":"e_1_3_2_1_2_1","unstructured":"M. Ates C. Gravier J. Lardon J. Fayolle B. Sauviac Interoperability between Heterogeneous Federation Architectures: Illustration with SAML and WS-Federation."},{"key":"e_1_3_2_1_3_1","volume-title":"Achieving Interoperability between active directory federation services and shibboleth. Available at: http:\/\/www.webarchive.org.uk, (Accessed","author":"Oxford Computer Group","year":"2007","unstructured":"Oxford Computer Group (2007) Achieving Interoperability between active directory federation services and shibboleth. Available at: http:\/\/www.webarchive.org.uk, (Accessed: 16 November 2016)."},{"key":"e_1_3_2_1_4_1","first-page":"29","volume-title":"Federated Identity Management: An Overview of Concepts and Standards","author":"E.","year":"2008","unstructured":"Maler, E. (2008), Federated Identity Management: An Overview of Concepts and Standards, p. 29."},{"key":"e_1_3_2_1_5_1","volume-title":"SP vs. IdP Initiated SSO.","author":"D.","year":"2016","unstructured":"Carru, D. (2016) SP vs. IdP Initiated SSO. Available at http:\/\/blogs.oracle.com, (Accessed: 5 January 2017)."},{"key":"e_1_3_2_1_6_1","volume-title":"Trust Requirements in Identity Federation Topologies","author":"Meinel M.","year":"2009","unstructured":"Kylau, U., Thomas, I., Menzel, M. and Meinel, C. (2009), Trust Requirements in Identity Federation Topologies."},{"key":"e_1_3_2_1_7_1","volume-title":"Security Assertion Markup Language (SAML) V2.0 Technical Overview. Available at: http:\/\/docs.oasis-open.org, (Accessed","author":"OASIS","year":"2008","unstructured":"OASIS (2008b) Security Assertion Markup Language (SAML) V2.0 Technical Overview. Available at: http:\/\/docs.oasis-open.org, (Accessed: 15 December 2016)."},{"key":"e_1_3_2_1_8_1","volume-title":"Web Services Federation Language","author":"OASIS","year":"2009","unstructured":"OASIS (2009) Web Services Federation Language (WS-Federation) Version 1.2. Available at: http:\/\/docs.oasis-open.org, (Accessed: 10 November 2016)."},{"key":"e_1_3_2_1_9_1","volume-title":"Identity Provider Discovery Service Protocol and Profile","author":"OASIS","year":"2008","unstructured":"OASIS (2008), Identity Provider Discovery Service Protocol and Profile."},{"key":"e_1_3_2_1_10_1","volume-title":"Deep-dive on SAML 2.0 vs","author":"Hubert","year":"2007","unstructured":"Hubert A. Le Van Gong, Deep-dive on SAML 2.0 vs. WS-Federation, huberts-blog, 2 March 2007."},{"key":"e_1_3_2_1_11_1","first-page":"99","volume-title":"Trust Requirements in Identity Management. Australasian Information Security Workshop 2005","volume":"44","author":"Fabre J.","year":"2005","unstructured":"J\u00f8sang, J. Fabre, B. Hay, J. Dalziel, S. Pope. Trust Requirements in Identity Management. Australasian Information Security Workshop 2005 volume 44, pages 99--108, 2005."},{"key":"e_1_3_2_1_12_1","volume-title":"&Lt","author":"Selon Georges","year":"2009","unstructured":"Selon Georges F. (2009), &Lt; Identit\u00e9 num\u00e9rique et repr\u00e9sentation de soi: analyse s\u00e9miotique et quantitative de l'emprise culturelle du web 2.0 &Gt;, R\u00e9seaux, vol 2 (n\u00b0154),p. 165--193."},{"key":"e_1_3_2_1_13_1","volume-title":"Identity Management: Concepts, technologies and systems","author":"Bertino E.","year":"2010","unstructured":"E. Bertino, K. Takahashi. Identity Management: Concepts, technologies and systems. Artech House, 194 pages, 2010"},{"key":"e_1_3_2_1_14_1","volume-title":"\u00c9crivain","author":"Harry G.","year":"2013","unstructured":"G. Harry, \u00c9crivain, IAM: GESTION DES IDENTITES ET DES ACCES CONCEPTS ET ETATS DE L'ART. [Performance]. Le Centre national de la recherche scientifique, 2013."},{"key":"e_1_3_2_1_15_1","unstructured":"Gestion des identit\u00e9s juillet 2007 - CLUSIF Club de la s\u00e9curit\u00e9 de l'information fran\u00e7ais."},{"key":"e_1_3_2_1_16_1","unstructured":"Identity federation using SAML and WebSphere software IBM DeveloperWorks Andrea Carmignani Angelo Littera."},{"key":"e_1_3_2_1_17_1","volume-title":"Access Control Systems Security, Identity Management and Trust Models","author":"Benantar M.","year":"2006","unstructured":"M. Benantar, Access Control Systems Security, Identity Management and Trust Models, New York: IBM Corporation, 2006."},{"key":"e_1_3_2_1_18_1","volume-title":"concepts et \u00e9tats de l'art,\" Centre Nationale de la Recherche Scientifique","author":"Harry G.","year":"2013","unstructured":"G. Harry, \"IAM - Gestion des identit\u00e9s et des acc\u00e8s: concepts et \u00e9tats de l'art,\" Centre Nationale de la Recherche Scientifique, 2013."},{"key":"e_1_3_2_1_19_1","volume-title":"Available: www.identityblog.com. [Accessed","author":"Cameron K.","year":"2015","unstructured":"K. Cameron, \"Identity Blog,\" Microsoft Corporation, 2005. [Online]. Available: www.identityblog.com. [Accessed December 2015]."},{"key":"e_1_3_2_1_20_1","unstructured":"Architecture-Based Hierarchical Interoperability Modeling and Evaluation of Internet Systems Fande Yang Huabing Han and Song Wang. M. K. M. S. Gail-Joon Ahn \"Privacy-enhanced User-Centric Identity Management \" IEEE ICC 2009."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","unstructured":"P. V B. D. D. V N. Jan Vossaert \"A Smart Card Based Solution for User-Centric Identity Management \" Privacy and Identity IFIP AICT p. 164--177 2011. 10.1007\/978-3-642-20769-3_14","DOI":"10.1007\/978-3-642-20769-3_14"},{"key":"e_1_3_2_1_22_1","unstructured":"M. L.-M. Uciel Fragoso-Rodriguez \"Federated Identity Architectures \" Conference in technical cooperation Mcis 2006."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","unstructured":"E. Bertino \"Digital Identity Management and Trust Negotiation \" in Security for Web Services and Service-Oriented Architectures Berlin Springer 2010. 10.1007\/978-3-540-87742-4","DOI":"10.1007\/978-3-540-87742-4"},{"key":"e_1_3_2_1_24_1","volume-title":"Une approche par gestion des risques","author":"Nassar P. B.","year":"2012","unstructured":"P. B. Nassar, \"Gestion de la s\u00e9curit\u00e9 dans une infrastructure de services dynamique: Une approche par gestion des risques,\" 2012."},{"key":"e_1_3_2_1_25_1","volume-title":"i. d. t.-S. D. L. N. D. L'UIT, \"Langage de balisage d'assertion de s\u00e9curit\u00e9 (SAML2.0)\". Patent X.1141","author":"U.","year":"2006","unstructured":"U. i. d. t.-S. D. L. N. D. L'UIT, \"Langage de balisage d'assertion de s\u00e9curit\u00e9 (SAML2.0)\". Patent X.1141, 2006."},{"key":"e_1_3_2_1_26_1","unstructured":"M. E. Hughes J. \"Security Assertion Markup Language (SAML) V2. 0 \" OASIS SSTC Working Draft 2005."},{"key":"e_1_3_2_1_27_1","unstructured":"M. U. Fragoso-Rodriguez \"Mod\u00e8le de Respect de la Vie Priv\u00e9e dans une Architecture d'identi\u00e9 federee \" 2009."},{"key":"e_1_3_2_1_28_1","volume-title":"Services Web en J2EE et .NET conception et impl\u00e9mentation, paris: \u00c9DITIONS EYROLLES 61, bd Saint-Germain 75240 Paris Cedex05","author":"C.","year":"2003","unstructured":"C. B. e. x. L. G. G. L. Maesano, Services Web en J2EE et .NET conception et impl\u00e9mentation, paris: \u00c9DITIONS EYROLLES 61, bd Saint-Germain 75240 Paris Cedex05, 2003."},{"key":"e_1_3_2_1_29_1","volume-title":"Beijing University of Posts and Telecommunications, beging","author":"Zhenhua G.","year":"2012","unstructured":"G. Zhenhua, \"Research and Implementation of a SAML-based SSO module,\" Institute of Network technology, Beijing University of Posts and Telecommunications, beging, 2012."},{"key":"e_1_3_2_1_30_1","first-page":"17","volume-title":"a. M. A. S. Umme Habiba, \"Secure Identity Management System for Federated Cloud Environment,\" in Studies in Computational Intelligence","author":"R.","year":"2015","unstructured":"R. M. a. M. A. S. Umme Habiba, \"Secure Identity Management System for Federated Cloud Environment,\" in Studies in Computational Intelligence, Springer International Publishing, 2015, pp. 17--33."},{"key":"e_1_3_2_1_31_1","unstructured":"F\u00e9d\u00e9ration d'identit\u00e9s et propagation d'attributs avec Shibbotleth -- Tutoriel JRES 2005."},{"key":"e_1_3_2_1_32_1","unstructured":"http:\/\/www.open-source-guide.com\/Solutions\/Developpement-et-couches-intermediaires\/Authentification-federation-et-de-gestion-d-identite\/Cas May 2016."},{"volume-title":"a. M. B. Jones, &Lt;Design Rationale behind the Identity Metasystem Architecture,&Gt","author":"K.","key":"e_1_3_2_1_33_1","unstructured":"K. C. a. M. B. Jones, &Lt;Design Rationale behind the Identity Metasystem Architecture,&Gt; Identity blog."},{"key":"e_1_3_2_1_34_1","volume-title":"a. F. Z. Yicun Zuo, &Lt;Towards a Dynamic Federation Framework Based on SAML and Automated Trust Negotiation,&Gt","author":"X.","year":"2010","unstructured":"X. L. a. F. Z. Yicun Zuo, &Lt;Towards a Dynamic Federation Framework Based on SAML and Automated Trust Negotiation,&Gt; WISM-Springer-Verlag, p. 254--262, 2010."},{"key":"e_1_3_2_1_35_1","volume-title":"ICN: The Eleventh International Conference on Networks","author":"Leandro Marcos A. P.","year":"2012","unstructured":"Marcos A. P. Leandro, Tiago J. Nascimento, Daniel R. dos Santos, Carla M. Westphall, Carlos B. Westphall, &Lt;Multi-Tenancy Authorization System with Federated Identity for Cloud-Based Environments Using Shibboleth,&Gt; ICN: The Eleventh International Conference on Networks, 2012."},{"key":"e_1_3_2_1_36_1","first-page":"13","volume-title":"IFIP","author":"Sadek Ferdous Md.","year":"2015","unstructured":"Md. Sadek Ferdous, Gethin Norman, Audun J\u00f8sang, Ron Poet, &Lt;Mathematical Modelling of Trust Issues in Federated Identity Management,&Gt; International Federation for Information Processing: IFIP, p. 13--29, 2015."},{"key":"e_1_3_2_1_37_1","volume-title":"Security patterns in practice: designing secure architectures using software patterns","author":"Fernandez E. B.","year":"2013","unstructured":"E. B. Fernandez, Security patterns in practice: designing secure architectures using software patterns, John Wiley Sons, 2013."},{"key":"e_1_3_2_1_38_1","unstructured":"P. Beraud &Lt;Approches technologiques pour la f\u00e9d\u00e9ration des identit\u00e9s &Gt; Microsoft Corporation Ao\u00fbt 2009."},{"key":"e_1_3_2_1_39_1","volume-title":"d. S. d. e. d. Communication, &Lt;R\u00e9f\u00e9rentiel G\u00e9n\u00e9ral d'Interop\u00e9rabilit\u00e9 Standardiser, s'aligner et se focaliser pour \u00e9changer efficacement,&Gt","author":"D.","year":"2015","unstructured":"D. I. d. S. d. e. d. Communication, &Lt;R\u00e9f\u00e9rentiel G\u00e9n\u00e9ral d'Interop\u00e9rabilit\u00e9 Standardiser, s'aligner et se focaliser pour \u00e9changer efficacement,&Gt; 2015."},{"key":"e_1_3_2_1_40_1","first-page":"1","author":"Yahia E.","year":"2011","unstructured":"E. Yahia, &Lt;Contribution \u00e0 l'\u00e9valuation de l'interop\u00e9rabilit\u00e9 s\u00e9mantique entre syst\u00e8mes d'information d'entreprise: Application aux syst\u00e8mes d'information de pilotage de la production,&Gt; Universit\u00e9 Henri Poincar\u00e9, Nancy 1, 2011.","journal-title":"Nancy"},{"key":"e_1_3_2_1_41_1","volume-title":"e. al., &Lt;Chapter 7 Layers of Interoperability,&Gt","author":"H.","year":"2011","unstructured":"H. K. e. al., &Lt;Chapter 7 Layers of Interoperability,&Gt; chez Organizational Interoperability in E-Government, Heidelberg, Springer, 2011."},{"key":"e_1_3_2_1_42_1","first-page":"99","volume-title":"R. Ajhoun, \"The security of web services: Secure communication and identity management\", BDCA15, CEUR proceding","author":"L'Amrani H.","year":"2015","unstructured":"H. L'Amrani, Y. El Bouzekri El Idrissi, R. Ajhoun, \"The security of web services: Secure communication and identity management\", BDCA15, CEUR proceding, pages 99--108, 2015."}],"event":{"name":"BDCA'17: 2nd international Conference on Big Data, Cloud and Applications","sponsor":["Minist\u00e8re de I'enseignement sup\u00e9rieur Minist\u00e8re de I'enseignement sup\u00e9rieur"],"location":"Tetouan Morocco","acronym":"BDCA'17"},"container-title":["Proceedings of the 2nd international Conference on Big Data, Cloud and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3090354.3090391","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3090354.3090391","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:48Z","timestamp":1750220628000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3090354.3090391"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,29]]},"references-count":42,"alternative-id":["10.1145\/3090354.3090391","10.1145\/3090354"],"URL":"https:\/\/doi.org\/10.1145\/3090354.3090391","relation":{},"subject":[],"published":{"date-parts":[[2017,3,29]]},"assertion":[{"value":"2017-03-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}