Identity Authentication and Data Access Authorization in Regional Education Informatization

Qi Feng, FuKe Shen, ZhongLin Chen, YuHong Zhu

Abstract


During the procedure of the Region-informatization, there are encountered different types of challenges. Playing the key roles in the construction mechanism, Governments, Universities, and enterprises are building their own information systems that are unable to be interoperable because of lacking interconnection standard. So these systems’ effective data-sharing mechanism poses to be a major point of concern. In this paper, from the top design of informatization eco-system, we are going to conduct discussion on the roles played by these participants in addition to the mechanism which these participants’ system is to interconnect, so that we could enhance the development of Region-informatization. We consider the Authentication System built in Shanghai Education as an illustration together with showing the process, design, implementation and the current situation comprehensively. The new approaches in this paper is to provide a fusion scheme of Oauth2 and Shibboleth, which combines the advantages of both. And in the maintenance on federation, provide some  methods and practices to improve service level


Full Text:

PDF

References


Zhou Z.J. etal., 2007. Research on classification and sharing mechanism of educational information resources [J]. E-education Research,2007(10)

Yin R.,2007. Research on the construction and sharing mechanism of regional basic educational information resources [J]. China Educational Technology, 2007(9)

Xiong C.P etal.,2010. Study on the development and application of educational information resources "regional co construction and sharing" [J]. Open Education Research,2010(01)

Liu Y.Q.,2013. Mode and operation management of foreign high education information resources sharing [J]. Library & Information,2013(02)

Zhang X. & Zhang L.G.,2011. Construction of Regional Sharing Model of information education resources [J]. China Medical Education Technology,2011(02)

Yu S.Q & Zhao X.L.,2009. Education informatization based on Information Ecology [J]. China Educational Technology,2009(08)

Feng Q.,2015. The concept of maintenance service products based on cross certification [J]. Journal of East China Normal University,2015(S1)

Ge J.M.,2011. Research and implementation of wireless access method based on Cross Authentication [D]Shanghai,Shanghai Jiao Tong University School of Software,2011

Wiki.shibboleth.net. (2017). Home - Shibboleth 2 - Shibboleth Wiki. [online] Available at: https://wiki.shibboleth.net/confluence/display/SHIB2/Home [Accessed 16 Apr. 2017].

Identity Assurance Assessment Framework.[online] Available at: http://www.incommon.org/docs/assurance/IAAF.pdf


Refbacks

  • There are currently no refbacks.