CFP last date
20 December 2024
Reseach Article

Convergence Analysis of Transcendental Fractals

by Shafali Agarwal, Ashish Negi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 52 - Number 16
Year of Publication: 2012
Authors: Shafali Agarwal, Ashish Negi
10.5120/8288-1817

Shafali Agarwal, Ashish Negi . Convergence Analysis of Transcendental Fractals. International Journal of Computer Applications. 52, 16 ( August 2012), 30-34. DOI=10.5120/8288-1817

@article{ 10.5120/8288-1817,
author = { Shafali Agarwal, Ashish Negi },
title = { Convergence Analysis of Transcendental Fractals },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 52 },
number = { 16 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume52/number16/8288-1817/ },
doi = { 10.5120/8288-1817 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:52:27.667000+05:30
%A Shafali Agarwal
%A Ashish Negi
%T Convergence Analysis of Transcendental Fractals
%J International Journal of Computer Applications
%@ 0975-8887
%V 52
%N 16
%P 30-34
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Service Oriented Architectures are an abstract concept which exposes capabilities in distributed, domain-spanning environments as services. These modern systems have three characteristics: They are heterogeneous, distributed and loose Coupling. With increasing popularity of Service Oriented Architecture (SOA), this is no longer possible since interacting systems are generally not located within a single security domain anymore. Using SOA without extra attention to security issues leads to various problems. Federated Identification is one of the most important security issues in collaborative systems which are not in the same security domain. To deal with this security issue, several Federated Identity Architecture initiatives have appeared recently. Federated identity architecture lets users dynamically distribute identity information across security domains, increasing the portability of their digital identities. All Federated Identity Architectures keep user's distributed mapping and/or centralized mapping of user's identifiers for federated identity. Saving the mappings for each user and updating them when changes happen will bring a Heavy Overload for the architecture. In this paper Federated Identification Architecture is presented which provides a Centralized Identity Provider (CIP). The architecture presented is highly beneficial in SOA and distributed environments. All security domains can integrate with this architecture using very few adjustments. Advantage of using CIP model is that users can accesses a service by using any of the identifiers which they prefer. The chosen identifier is not always the identifier recognized by the requested service.

References
  1. E. Maler, D. ond. "Options and Issues in Federated Identity Management". IEEE Security & Privacy. 2008
  2. M. Linden. "Organising Federated Identity in Finnish Higher Education". Computational Methods in Science and Technology, Volume 11, Issue 2, 2005. 109–118
  3. A. Jøsang, S. Pope. "User Centric Identity Management". AusCERT Conference. 2005
  4. S. Kamburugamuwa, K. Indrasiri, P. Perera, M. Pathirage. "Federated Identity Framework for Web Services". Department of computer science & engineering, university of Moratuwa,SRI LANKA. final year project.
  5. InCommon Federation. InCommon glossary http://ww. incommonfederation. org/glossary. cfm Referenced 2. 5. 2005.
  6. U. Fragoso-Rodriguez, M. Laurent-Maknavicius, J. Incera-Dieguez. "Federated Identity Architectures". 2005
  7. T. Wason. "Introduction to Liberty Alliance Identity Architecture", URL: http://www. projectliberty. org. Revision 1. 0. Liberty Alliance Project, 2003
  8. T. Scavo, S. Cantor. "Shibboleth architecture, Technical Overview". URL:http://shibboleth. internet2. edu/shibboleth-documents. html. Working Draft 02. June. 2005
  9. Security Roadmap. "Security in a Web Service World: A Proposed Architecture And RoadMap ". URL://www. 128. ibm. com/developerworks/webservices/library/specification/ws-secmap/. IBM and Microsoft white paper. April 7,2002
  10. T. Jonathan, K. Yuzo. "Liberty ID-WSF Web Services Framework Overview". URL: http://www. projectliberty. org. Version 1. 0. Liberty Alliance project. 2004
  11. M. H. kang, A. Khashnobish. "A Peer-to-Peer Federated Authentication System". Sixth International Conference on Information Technology: New Generations, IEEE Computer Society, 2009
  12. M. Wolf, I. Thomas, M. Menzel,C. Meinel. "A Message Meta Model for Federated Authentication in Service Oriented Architectures". IEEE. 2009
  13. M. MacKenzie, K. Laskey, F. McCabe, P. Brown, R. Metz. "Reference Model for Service Oriented Architecture 1. 0. " OASIS Committee Specification, February 2006
Index Terms

Computer Science
Information Sciences

Keywords

Identification SOA Federated Identity