{"id":737,"date":"2021-03-01T09:00:49","date_gmt":"2021-03-01T09:00:49","guid":{"rendered":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/?p=737"},"modified":"2023-06-30T10:05:47","modified_gmt":"2023-06-30T09:05:47","slug":"securing-the-internet","status":"publish","type":"post","link":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/2021\/03\/01\/securing-the-internet\/","title":{"rendered":"Securing the Internet"},"content":{"rendered":"<p class=\"lead\">Since the early-2000s Professor David Chadwick and a University of Kent team in the School of Computing have undertaken extensive research in the field of Information Systems security, resulting in the development of novel Federated Identity Management (FIM) technologies.<\/p>\n<div class=\"video-container\"><div class=\"kent-video-wrapper\"><span class='embed-youtube' style='text-align:center; display: block;'><iframe class='youtube-player' type='text\/html' width='1140' height='672' src='https:\/\/www.youtube.com\/embed\/MgE5dI09A4M?version=3&#038;rel=1&#038;fs=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;wmode=transparent' frameborder='0' allowfullscreen='true'><\/iframe><\/span><\/div><\/div>\n<p>FIM allows users of online services to use their existing usernames and passwords, instead of having to create a new pair whenever they want to access a new online service, which could quickly cause serious password management problems. Furthermore, having to create and memorise many passwords would make users choose weak and easily crackable passwords, causing security issues. By using FIM, online users can dramatically reduce the number of passwords they need, and this would allow them to create and maintain stronger passwords.<\/p>\n<div class=\"\">\n<p>The FIM\u2019s introduction has been recognised by OpenStack \u2014 a community cloud project involving 135+ international leading vendors, including Lenovo, Oracle, RedHat, IBM, Rackspace, and Cisco \u2014 for accelerating and shaping the project\u2019s federated identity system\u2019s performance. FIM\u2019s impact has also been acknowledged by OpenStack users for advancing their organisational security and efficiency whilst also saving significant costs.<\/p>\n<p><em>References<\/em><br \/>\n<em>[1] Chadwick, D., Siu, K., Lee, C., Fouillat, Y. and Germonville, D. (2014). \u201cAdding Federated Identity Management to OpenStack\u201d. Journal of Grid Computing [Online] 12:3-27. Available at:\u00a0<a href=\"http:\/\/dx.doi.org\/10.1007\/s10723-013-9283-2\">http:\/\/dx.doi.org\/10.1007\/s10723-013-9283-2<\/a><\/em><br \/>\n<em>[2] Chadwick, D. (2009). \u201cFederated Identity Management\u201d. In: Aldini, A., Barthe, G. and Gorrieri, R. eds. FOSAD 2008\/2009. Berlin: Springer-Verlag, pp. 182-196. Available at:\u00a0<a href=\"http:\/\/dx.doi.org\/10.1007\/978-3-642-03829-7_3\">http:\/\/dx.doi.org\/10.1007\/978-3-642-03829-7_3<\/a>.<\/em><\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Since the early-2000s Professor David Chadwick and a University of Kent team in the School of Computing have undertaken extensive research in the field of &hellip; <a href=\"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/2021\/03\/01\/securing-the-internet\/\">Read&nbsp;more<\/a><\/p>\n","protected":false},"author":74795,"featured_media":738,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[275477,256065],"tags":[278378,281564,281327,223259],"_links":{"self":[{"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/posts\/737"}],"collection":[{"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/users\/74795"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/comments?post=737"}],"version-history":[{"count":1,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/posts\/737\/revisions"}],"predecessor-version":[{"id":739,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/posts\/737\/revisions\/739"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/media\/738"}],"wp:attachment":[{"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/media?parent=737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/categories?post=737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.kent.ac.uk\/kei-case-studies\/wp-json\/wp\/v2\/tags?post=737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}