By Topic

Identity management architecture

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Glasser, U. ; Software Technol. Lab., Simon Fraser Univ., Burnaby, BC ; Vajihollahi, M.

Identity Management plays a crucial role in many application contexts, including e-Governments, e-Commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, have introduced new problems, especially concerning interoperability and privacy. We focus here on two fundamental issues within this context: (1) a firm unifying semantic foundation for the systematic study of identity management and improved accuracy in reasoning about key properties in identity management system design, and (2) the practical relevance of developing a distributed approach to identity management (as opposed to a centralized one). The proposed mathematical framework is built upon essential requirements of an identity management system (such as privacy, user-control, and minimality), and serves as a starting point for bringing together different approaches in a systematic fashion in order to develop a distributed architecture for identity management.

Published in:

Intelligence and Security Informatics, 2008. ISI 2008. IEEE International Conference on

Date of Conference:

17-20 June 2008