Cart (Loading....) | Create Account
Close category search window
 
Skip to Results

Search Results

You searched for: identity management
2,737 Results returned
Skip to Results
  • Download Citations Disabled
  • Save To Project
  • Email
  • Print
  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Criteria for Evaluating the Privacy Protection Level of Identity Management Services

    Lee, Hyangjin ; Inkyoung Jeun ; Hyuncheol Jung
    Emerging Security Information, Systems and Technologies, 2009. SECURWARE '09. Third International Conference on

    Digital Object Identifier: 10.1109/SECURWARE.2009.31
    Publication Year: 2009 , Page(s): 155 - 160

    IEEE Conference Publications

    Identity management is the one of Web services that manages the digital identity and the personally identifiable information of the user who subscribed for various Web services in Internet. It was developed to provide user with an easy way to use and manage various user's digital identities that were provided from each Web service. If the user subscribes to an identity management service, the user can access the other Web sites affiliated with the identity management service and use their Web services by using the identity issued by the identity management service. And the user can manage the user's personally identifiable information distributed among various Web sites in an integrated way through this service. However, if the identity provider, which provides this identity management service, discloses the user's identity and personal identifiable information, identity theft can happen throughout the entire affiliated web sites. As a result, the privacy protection level of the identity provider, that is, the level of protection for personally identifiable information, is the critical factor of successful identity management service. Therefore, identity provider should provide an easy way to the internal or external auditor of them for assessing the privacy protection level. This paper describes privacy threats for each identity life cycle, such as identity provision, propagation, use and maintain, and destruction, and proposes the criteria that evaluate the privacy protection level provided by the identity provider as a countermeasure against these threats. The internal or external auditor can use the criteria described in this paper, as a way of assessing the privacy protection level of identity provider. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Enhancing Claim-Based Identity Management by Adding a Credibility Level to the Notion of Claims

    Thomas, I. ; Meinel, C.
    Services Computing, 2009. SCC '09. IEEE International Conference on

    Digital Object Identifier: 10.1109/SCC.2009.66
    Publication Year: 2009 , Page(s): 243 - 250
    Cited by:  Papers (1)

    IEEE Conference Publications

    Claim based identity management denotes an open identity model which uses the notion of claims to describe identity attributes. A claim is an identity attribute named with an abstract identifier (e.g. a URI), which applications and services can use to specify the attributes they need. Open and extensible formats for the exchange of identity attributes ensure interoperability among different identity systems. For this reason, claim based identity management lays the ground for Identity metasystems, which provide an identity layer on top of existing identity systems and promise an easier management of digital identities among the Internet.However, the Internet grew into an environment of mostly isolated domains for a good reason. Service providers find it hard to accept identity information from any other than the own domain. While claim based identity management provides the means to specify identity information on a per attribute basis, trust is usually defined in a general manner. Service providers state the issuers of identity information, they trust, but do not restrict for what. In this paper, we argue that for a truly decentralized management of identity information, trust should be defined on the same granular level as identity information. We propose a model which considers trust on a per-claim basis. In our model, trust into a claim is defined as the assumed correctness and integrity of a claim in dependence of the issuer. As a proof-of-concept, we implemented a small flight booking scenario which uses claims augmented with an expected trust level to show how we can achieve more flexibility for the user in his choice of an identity provider when considering not only whom to trust, but for what. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Evaluation Criteria for Future Identity Management

    Leskinen, J.
    Trust, Security and Privacy in Computing and Communications (TrustCom), 2012 IEEE 11th International Conference on

    Digital Object Identifier: 10.1109/TrustCom.2012.153
    Publication Year: 2012 , Page(s): 801 - 806

    IEEE Conference Publications

    The importance of identity management grows hand in hand with online services. This growth presents demands to the current technologies that require new solutions and tools to satisfy. In order to enable these new approaches, comprehensive design and evaluation criteria for identity management systems are needed. This work proposes new design and evaluation criteria for future identity management system designs. These new criteria are achieved by first reviewing criteria presented in current literature and then proceeding to combine these to create a more comprehensive set of requirements. The resulting criteria were then successfully tested by evaluating the Shibboleth and OpenID approaches to identity management. This test also produced preliminary results on aspects of identity management that future systems should attempt to address such as trust management. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Identity management and its impact on federation in a system-of-systems context

    Balasubramaniam, S. ; Lewis, G.A. ; Morris, E. ; Simanta, S. ; Smith, D.B.
    Systems Conference, 2009 3rd Annual IEEE

    Digital Object Identifier: 10.1109/SYSTEMS.2009.4815794
    Publication Year: 2009 , Page(s): 179 - 182
    Cited by:  Papers (1)

    IEEE Conference Publications

    In its simplest form, identity management deals with how users are identified and authorized across networks. In the case of federated identity management, these networks cross system and organizational boundaries. To manage identity in this context, a cooperative contract is set up between multiple identity providers, using a decentralized approach. Establishing an identity management strategy within a single entity is straightforward. However, implementing identity management in a system of systems context presents unique challenges. This paper explains identity management in a federated context, presents the challenges of federated identity management, and provides some guidelines for successful federated identity management. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Enabling User Control with Personal Identity Management

    Eap, T. ; Hatala, M. ; Gasevic, D.
    Services Computing, 2007. SCC 2007. IEEE International Conference on

    Digital Object Identifier: 10.1109/SCC.2007.56
    Publication Year: 2007 , Page(s): 60 - 67
    Cited by:  Papers (2)

    IEEE Conference Publications

    Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breaches can happen and no identity management system can provide full-proof security. The challenge is even greater in service-oriented architectures where each user has their identities scattered across many services and has no control over management of those identities. Recent research in the area of the user-centric identity management makes user control and consent the key concept for identity management, but there is no consensus on the level of user-centricity. This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities. The advantages of this proposal can be demonstrated through a comparison analysis of relevant identity management systems against a set of criteria required for today's identity management. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A study on threat model for federated identities in federated identity management system

    Khattak, Z.A. ; Sulaiman, S. ; Manan, J.A.
    Information Technology (ITSim), 2010 International Symposium in

    Volume: 2
    Digital Object Identifier: 10.1109/ITSIM.2010.5561611
    Publication Year: 2010 , Page(s): 618 - 623
    Cited by:  Papers (4)

    IEEE Conference Publications

    Federated Identity Management (FIM) based on standards allows and facilitates participating federated organizations to share users identity attributes, facilitate authentication and grant or deny service access requests. Using single sign-on facility users authenticates only once to home identity provider and logged into access successive service providing service providers within federation. User's identity theft, misused of user identity information via single sign-on facility in identity providers and service providers, and trustworthiness of subject, identity providers and service providers are active concerns in federated identity management systems. In addition, we had explored trusted computing technology, which covers Trusted Platform Module security features such as Trusted Platform Module Identity, Integrity Measurement and Key certification as well as Trusted Network Connect. In this paper, we presented conceptual threat model for inter-domain web single sign-on in federate identity management system. For this, we set identity theft, misused of identity information, and trust relationship scenarios and in the end, we discussed how trusted computing technology use can effectively resolve identity theft, misused of identity information, and trust relationship concerns in federated identity management system. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Modular reference framework architecture for Identity Management

    Dabrowski, M. ; Pacyna, P.
    Communication Systems, 2008. ICCS 2008. 11th IEEE Singapore International Conference on

    Digital Object Identifier: 10.1109/ICCS.2008.4737284
    Publication Year: 2008 , Page(s): 743 - 749
    Cited by:  Patents (1)

    IEEE Conference Publications

    Interoperable identity management systems are prerequisite for novel user-centric services, which strongly rely on user identity attributes and security services. Future identity management systems will enable dynamic and automatic exchange of user identity attributes between services from different key-business areas, e.g. Internet, healthcare, e-government, e-banking, entertainment, etc. Moreover, they will allow federating different user identities so that any of them will be sufficient to dynamically bootstrap trust relation between the user and any service. For this to happen, identity management systems need to include capabilities for dynamic and automatic ad-hoc interworking. This paper is a step towards this approach. It proposes a modular reference framework architecture for identity management systems and it introduces identity management layers. The value of the proposed architecture is in its generic yet complete approach, in modularity and in layered structure which allows covering isolated, centralized, federated and personal authentication management schemes. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    SIM: A smartphone-based identity management framework and its application to Arkansas trauma image repository

    Mengjun Xie ; Topaloglu, U. ; Powell, T. ; Chao Peng ; Jiang Bian
    Bioinformatics and Biomedicine (BIBM), 2013 IEEE International Conference on

    Digital Object Identifier: 10.1109/BIBM.2013.6732600
    Publication Year: 2013 , Page(s): 53 - 60

    IEEE Conference Publications

    Secure and convenient user identity management is particularly important to the success of EMR, EHR, and PHR systems. Unfortunately, widely-used identity management mechanisms that solely rely on username/password are inadequate to meet the strong security and privacy requirements for protecting sensitive user information and medical data. Two-factor authentication approaches that are more convenient and user friendly than existing solutions have been given top priority in the healthcare sector where the majority of healthcare practitioners and patients are not tech-savvy. In this paper, we present a smartphone-based identity management framework-SIM-to enhance the security and usability of user identity management in healthcare information systems. SIM leverages the popularity and computational power of smartphone. Within the SIM framework, a person employs a smartphone to centrally store and manage her identity credentials and authenticates herself to healthcare applications using two-factor authentication without typing any identity credentials. Moreover, SIM provides patients with a patient-controlled authorization mechanism to help patients manage the accesses to their PHRs in a secure and convenient manner. Using an existing EMR system-Arkansas Trauma Image Repository-as an example, we demonstrate that SIM can be applied to a real-world healthcare information system to enhance its protection of user credentials and sensitive information. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Universal Identity Management Model Based on Anonymous Credentials

    Yong Zhang ; Jun-Liang Chen
    Services Computing (SCC), 2010 IEEE International Conference on

    Digital Object Identifier: 10.1109/SCC.2010.46
    Publication Year: 2010 , Page(s): 305 - 312

    IEEE Conference Publications

    The relationship-focused and credential-focused identity management are both user-centric notions in Service-oriented architecture (SOA). For composite services, pure user-centric identity management is inefficient because each sub-service may authenticate and authorize users and users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management model where identity information and privileges are delegatable, user-centricity will be more feasible in SOA. This paper aims to extend WS-Federation to build a universal identity management model based on anonymous credentials, which provides the delegation of anonymous credentials and combines identity metasystem to support easy-to-use, consistent experience and transparent security. In addition, the concept of self-generated pseudonym is introduced to construct efficient anonymous delegation model. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Delegation Solution for Universal Identity Management in SOA

    Yong Zhang ; Jun-Liang Chen
    Services Computing, IEEE Transactions on

    Volume: 4 , Issue: 1
    Digital Object Identifier: 10.1109/TSC.2010.9
    Publication Year: 2011 , Page(s): 70 - 81
    Cited by:  Papers (2)

    IEEE Journals & Magazines

    The relationship-focused and credential-focused identity managements are both user-centric notions in Service-oriented architecture (SOA). For composite services, pure user-centric identity management is inefficient because each subservice may authenticate and authorize users and users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management where identity information and privileges are delegatable, user centricity will be more feasible in SOA. The credential-focused system is a good starting point for constructing a universal identity management system. However, how to implement a practical delegation scheme is still a challenge although there are some delegatable anonymous credential schemes that were theoretically constructed. This paper aims to propose a practical delegation solution for universal identity management. For this, a pseudonym-based signature scheme is first designed where pseudonyms are self-generated and unlinkable for realizing user's privacy. Next, a proxy signature is presented with the pseudonyms as public keys where delegation can be achieved through certificate chains. Finally, the security of our scheme is analyzed and proved in the random oracle model. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Identity management architecture

    Glasser, U. ; Vajihollahi, M.
    Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on

    Digital Object Identifier: 10.1109/ISI.2008.4565043
    Publication Year: 2008 , Page(s): 137 - 144
    Cited by:  Papers (1)

    IEEE Conference Publications

    Identity Management plays a crucial role in many application contexts, including e-Governments, e-Commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, have introduced new problems, especially concerning interoperability and privacy. We focus here on two fundamental issues within this context: (1) a firm unifying semantic foundation for the systematic study of identity management and improved accuracy in reasoning about key properties in identity management system design, and (2) the practical relevance of developing a distributed approach to identity management (as opposed to a centralized one). The proposed mathematical framework is built upon essential requirements of an identity management system (such as privacy, user-control, and minimality), and serves as a starting point for bringing together different approaches in a systematic fashion in order to develop a distributed architecture for identity management. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A comparative analysis of Identity Management Systems

    Ferdous, M.S. ; Poet, R.
    High Performance Computing and Simulation (HPCS), 2012 International Conference on

    Digital Object Identifier: 10.1109/HPCSim.2012.6266958
    Publication Year: 2012 , Page(s): 454 - 461
    Cited by:  Papers (1)

    IEEE Conference Publications

    In this paper, we present a comparative analysis of a few popular Identity Management Systems against a set of requirements. Identity Management and Identity Management Systems have gained significant attention in recent years with the proliferation of different web-enabled and e-commerce services leading to an extensive research on the field in the form of several projects producing many standards, prototypes and application models both in the academia and the industry. We have collected and compiled different requirements from different sources to profile an extensive set of requirements that are required for a Privacy-Enhancing Identity Management System and presented them in the form of a taxonomy. Then we have compared some Identity Management Systems against those requirements and presented them in a concise way to help readers find out instantly which systems satisfy what requirements and thus help them to choose the correct one to fit into their own scenarios. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Generic and Complete Three-Level Identity Management Model

    Dabrowski, M. ; Pacyna, P.
    Emerging Security Information, Systems and Technologies, 2008. SECURWARE '08. Second International Conference on

    Digital Object Identifier: 10.1109/SECURWARE.2008.18
    Publication Year: 2008 , Page(s): 232 - 237
    Cited by:  Papers (1)

    IEEE Conference Publications

    Identity management has become an issue of central importance. It is relevant to service composition and provisioning in telecommunications and in computer systems, especially to their security, enrichment and customization. However, the plentitude of proprietary and open source identity management solutions causes interoperability problems as well as legal issues. This in turn slows down the pace of services development. The key step for reconciliation and cohesive creation of identity management systems is to create a single and complete identity management model. This paper is a step towards this approach. It proposes the generic and complete three-level identity management model. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Towards usable and reasonable Identity Management in heterogeneous IT infrastructures

    Rieger, S. ; Neumair, B.
    Integrated Network Management, 2007. IM '07. 10th IFIP/IEEE International Symposium on

    Digital Object Identifier: 10.1109/INM.2007.374820
    Publication Year: 2007 , Page(s): 560 - 574
    Cited by:  Papers (1)

    IEEE Conference Publications

    Identity management (IDM) has driven many IT projects especially in large IT infrastructures. Like other projects that focused on security or authentication, e.g. Public Key Infrastructures (PKI), they do not only reduce complexity and ease administration, but have to be managed themselves. This leads to costs and effort being necessary before gaining the benefit of unified authentication. This is maybe a reason why many projects dealing with IDM failed in the past or didn't reach their initial goals. Nevertheless the trend to use decentralized access to resources e.g. via the Internet or World Wide Web seems unbroken - demanding for solutions to decentrally authenticate users. New techniques like Identity Federations address this requirement and extend Identity Management geographically. This paper shows ways to measure Identity Management efficiency and to enable balance between usability which influences the effort needed to authenticate and the resulting established security levels. This balance is defined as the key to reasonable and efficient Identity Management solutions in the future. Experience is gained from an Identity Management project to unify authentication in heterogeneous scientific IT infrastructures. The presented model and the lessons learned can be adopted for forthcoming Identity Management projects in other organizations or support decisions about future IDM projects. Beyond unveiling drawbacks of classical IDM solutions and showing solutions, the paper gives a concluding outlook on future IDM developments and upcoming challenges for authentication and security or access management. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    A Decentralized Approach for Implementing Identity Management in Cloud Computing

    Jun Chen ; Xing Wu ; Shilin Zhang ; Wu Zhang ; Yanping Niu
    Cloud and Green Computing (CGC), 2012 Second International Conference on

    Digital Object Identifier: 10.1109/CGC.2012.118
    Publication Year: 2012 , Page(s): 770 - 776

    IEEE Conference Publications

    Cloud computing is the next generation of computing paradigm. Along with cloud computing, many related problems come up. And these problems in turn slow the speed of the development of cloud computing down. Among these problems, e.g. interoperability and privacy, identity management and security are strong concerned. Many researchers and enterprises have already done a lot to optimize the identity management and strengthen the security in cloud computing. Most of these studies focus on the usability of identity management and various kinds of method to help improve security. But in this paper, we do some research from a new angle. While the federated solution of identity management helps relieve many problems, it's adopted by many platforms and enterprises. The general approach for deploying identity management is a centralized component processing authentication and authorization requests. But with the cloud growing in scale and the increasing number of users, this centralized solution will be the bottleneck of the cloud. In this paper, we propose a decentralized approach for implementing identity management in service oriented architecture in cloud computing and a grouping algorithm as the deploy strategy. Security is another problem involved in this paper. Since many researchers have done many detailed and fruitful studies in security, the security solution illustrated in this paper is specific in the proposed architecture. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Biometrics in Identity Management Systems

    Wayman, J.L.
    Security & Privacy, IEEE

    Volume: 6 , Issue: 2
    Digital Object Identifier: 10.1109/MSP.2008.28
    Publication Year: 2008 , Page(s): 30 - 37
    Cited by:  Papers (3)

    IEEE Journals & Magazines

    Biometric technology - the automated recognition of individuals using biological and behavioral traits - has been presented as a natural identity management tool that offers "greater security and convenience than traditional methods of personal recognition." Indeed, many existing government identity management systems employ biometrics to assure that each person has only one identity in the system and that only one person can access each identity. Historically, however, biometric technology has also been controversial, with many writers suggesting that biometrics invade privacy, that specific technologies have error rates unsuitable for large-scale applications, or that the techniques "are useful to organizations that regulate the individual, but of little use where the individual controls identification and authorization." Here, I address these controversies by looking more deeply into the basic assumptions made in biometric recognition. I'll look at some example systems and delve into the differences between personal identity and digital identity. I'll conclude by discussing how those whose identity is managed with biometrics can manage biometric identity management. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Supports for Identity Management in Ambient Environments - The Hydra Approach

    Akram, H. ; Hoffmann, M.
    Systems and Networks Communications, 2008. ICSNC '08. 3rd International Conference on

    Digital Object Identifier: 10.1109/ICSNC.2008.77
    Publication Year: 2008 , Page(s): 371 - 377
    Cited by:  Papers (3)  |  Patents (1)

    IEEE Conference Publications

    Context-aware intelligent homes, body area networks in healthcare as well as holistic and sustainable agriculture are prominent scenarios in the scope of the research field Ambient Environments and Ubiquitous Computing. Such environments where mobile and wireless networks consist of numerous nodes, like sensors, intelligent gateways and mobile devices, require a highly secured and well defined Identity Management framework. Such a framework has to deal with the complete life cycle of identities of users, services and devices as well as userspsila awareness in information disclosure and privacy. The Identity Management Framework introduced in this paper aims at enabling developers of ambient environments to provide identity management mechanisms according to their specific service scenarios transparent of the underlying standards and security details. From the core requirements analysed in the EU-Project Hydra , the need for an autonomous identity management module is evident. Based on an evaluation of existing Identity Management Systems the paper, therefore, introduces an identity management framework that meets those requirements and will be integrated into the Hydra middleware. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    UNIQuE: A User-Centric Framework for Network Identity Management

    Altmann, J. ; Sampath, R.
    Network Operations and Management Symposium, 2006. NOMS 2006. 10th IEEE/IFIP

    Digital Object Identifier: 10.1109/NOMS.2006.1687578
    Publication Year: 2006 , Page(s): 495 - 506
    Cited by:  Papers (2)  |  Patents (1)

    IEEE Conference Publications

    Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, range from managing the outburst of user identities to protecting user interests as well as business interests. This paper proposes a framework for network identity management on the Internet that addresses these issues from a user-centric point of view. After discussing the challenges and opportunities of a user-centric identity management system, we describe the architecture of our framework called UNIQuE in detail. The architecture comprises components such as a security infrastructure, a trust subsystem, an inter-provider communication system, and a repository system. In essence, the goal of this framework is to specify a comprehensive, user-centric solution to all identity-related issues, which also vouches for effortless maintenance. The fundamental difference to existing systems is its integrating approach to many usually separately considered, identity-related issues View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Supporting Compliant and Secure User Handling - A Structured Approach for In-House Identity Management

    Fuchs, L. ; Pernul, G.
    Availability, Reliability and Security, 2007. ARES 2007. The Second International Conference on

    Digital Object Identifier: 10.1109/ARES.2007.145
    Publication Year: 2007 , Page(s): 374 - 384
    Cited by:  Papers (1)

    IEEE Conference Publications

    The catchword "compliance" dominates the actual debate about identity management and information security like few before. Companies need to comply with a variety of internal and external standards and regulations like the US SOX Act. Identity management is seen as a main provider of compliance in modern companies. However, its organisational aspects are underestimated in many projects, lacking a comprehensive approach to introduce in-house identity management. This work is based on the experiences gained from industry projects using identity management functionalities to strengthen security and to reach a high level of compliance. We develop a structured process-oriented methodology for introducing an identity management infrastructure for organisations using drivers from IT security management to evaluate, rank, and implement subprojects. The methodology consists of an iterative process which enables even large and unstructured organisations to reach a suitable and profitable level of identity management by emphasising on organisational aspects rather than taking a merely technical approach View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Identity Management in Mobile Ubiquitous Environments

    Johansen, T.A. ; Jrstad, I. ; Do van Thanh
    Internet Monitoring and Protection, 2008. ICIMP '08. The Third International Conference on

    Digital Object Identifier: 10.1109/ICIMP.2008.29
    Publication Year: 2008 , Page(s): 178 - 183
    Cited by:  Papers (4)

    IEEE Conference Publications

    Identity management is one of the major challenges on the Internet today, mainly due to the ever increasing number of services provided and at the same time an increasing amount of fraudulent service usage. As service access is becoming more and more ubiquitous, and services are used in distributed mobile environments, the challenges are growing even more, because the different points of access can now be subject to additional types of attacks towards the userpsilas credentials and otherwise private information. This paper considers some of the challenges in identity management on the Internet today, and adds to this the new requirements posed by identity management in mobile ubiquitous environments. The paper then studies the currently emerging identity management frameworks and standards initiatives, and sees how these cope with requirements both on the Web today as well as the new requirements posed by the introduction to the mobile ubiquitous environments. Then, architectures for identity management integration are proposed and the benefits of the architectures are discussed. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Identity Management Architecture: A new direction

    White, P.
    Computer and Information Technology, 2008. CIT 2008. 8th IEEE International Conference on

    Digital Object Identifier: 10.1109/CIT.2008.4594710
    Publication Year: 2008 , Page(s): 408 - 413

    IEEE Conference Publications

    The use of an Identity Management Architecture is emerging as a key concept in meeting the requirements for an effective information security architecture. This paper describes some of the results of a recent case study of the current designs for Identity Management Architecture within the Australian Public Sector and extracts the common elements of these architectures. The major elements of Identity Management are described and a new definition for an Identity Management Architecture is proposed. Identity Management Architecture is a new research area where further research is required. This work should contribute to the further development of Identity Management models. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    User-oriented identity management model for web-services

    Shah, A. ; Farooq, A. ; Talib, K.
    High Capacity Optical Networks and Enabling Technologies, 2007. HONET 2007. International Symposium on

    Digital Object Identifier: 10.1109/HONET.2007.4600277
    Publication Year: 2007 , Page(s): 1 - 8

    IEEE Conference Publications

    Identification of an identity in the web services environment has influence on personal, business, social, and government matters, and its management systems are traditionally considered from the service providerspsila point of view. In other words, an identity management system handles an activity that is undertaken by a service provider to provide and manage services and the user identities. These systems are designed to be cost effective and scalable primarily for a service provider view-point but not necessarily for a user view-point, as it often results in difficult usability such as the users often have to remember and maintain multiple passwords for accessing different services. Also, the identities are facing threats like phishing and pharming. Currently available identity management models are unable to overcome these shortcomings. In this paper, to overcome these shortcomings we propose a user identity model. This model provides user identity and service provider profiles on a portable digital device at the user-end which also makes it platform independent by implementing two-way authentication, and it protects user identity from identity threats. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    User-Centric Identity Management: New Trends in Standardization and Regulation

    Bramhall, P. ; Hansen, M. ; Rannenberg, K. ; Roessler, T.
    Security & Privacy, IEEE

    Volume: 5 , Issue: 4
    Digital Object Identifier: 10.1109/MSP.2007.99
    Publication Year: 2007 , Page(s): 84 - 87
    Cited by:  Papers (9)

    IEEE Journals & Magazines

    In offering services to individuals, enterprises often deal with a lot of personal information, the improper handling of which creates security risks for both the enterprises and individuals concerned. Authentication procedures usually assume specific behavior on the part of individuals, and this perception becomes a critical part of an enterprise's security mechanism. Identity management systems are touted as a solution, but even though users and enterprises are stakeholders in the broader conversation about identity management, their interests aren't necessarily aligned: who's in control, and whose interests will prevail in ease of conflict? The European Commission-funded Privacy and Identity Management tor Europe project (Prime: www.prime-projeet.eu) proposes a solution driven by the EU Privacy Directive (95/46/EC; http://ec.europa.eu/justice_home/fsj/privacy/law/), which puts the user in control wherever possible. This article focuses on that project and how it interacts with standardization initiatives and international organizations. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    Distributed Identity Management Model for Digital Ecosystems

    Koshutanski, H. ; Ion, Mihaela ; Telesca, L.
    Emerging Security Information, Systems, and Technologies, 2007. SecureWare 2007. The International Conference on

    Digital Object Identifier: 10.1109/SECUREWARE.2007.4385323
    Publication Year: 2007 , Page(s): 132 - 138
    Cited by:  Papers (7)

    IEEE Conference Publications

    Digital ecosystems is the new paradigm for dynamic IT business integration. A digital ecosystem consists of institutions that compete, collaborate, and form stable or unstable federations. Such a dynamic environment becomes a bottleneck for identity management solutions. Existing solutions are either too restricting and not flexible enough to support the dynamic nature of ecosystems or they are too complex and difficult to adopt by small and medium-size enterprises (SMEs). This paper presents an identity management model for automated processing of identity information between distributed ecosystem partners. The model emphasizes on its practical, clear and easy to deploy framework. The model is based on the new OASIS SAML standard to provide interoperability and convergence between existing identity technologies. The paper presents the basic and extended identity models for single services and service compositions. The aim of this research is to allow SMEs to use and enhance their current identity technology with a practical and easy to implement identity management solution that scales up to the dynamic and distributed nature of digital ecosystems. View full abstract»

  • Full text access may be available. Click article title to sign in or learn about subscription options.

    User-centric privacy management for federated identity management

    Gail-Joon Ahn ; Moonam Ko
    Collaborative Computing: Networking, Applications and Worksharing, 2007. CollaborateCom 2007. International Conference on

    Digital Object Identifier: 10.1109/COLCOM.2007.4553829
    Publication Year: 2007 , Page(s): 187 - 195

    IEEE Conference Publications

    We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of identity is the important component of this vehicle. Identity management has been recently considered to be a viable solution for simplifying user management across enterprise applications. The network identity of each user is the global set of personal credentials and preferences constituting the various accounts. The prevalence of business alliances or coalitions necessitates the further evolution of identity management, named federated identity management (FIM). The main motivation of FIM is to facilitate the federation of identities among business partners emphasizing on ease of user management. In this paper, we propose systematic mechanisms to specify privacy preferences in FIM, attempting to help users facilitate preferences for managing their private information across domains. View full abstract»

Skip to Results

SEARCH HISTORY

Search History is available using your personal IEEE account.

Need Help?


IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.