Identity Management

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 89586 Experts worldwide ranked by ideXlab platform

Mohamed Shehab - One of the best experts on this subject based on the ideXlab platform.

  • ICC - Privacy-Enhanced User-Centric Identity Management
    2009 IEEE International Conference on Communications, 2009
    Co-Authors: M. Ko, Mohamed Shehab
    Abstract:

    User-centric Identity Management approaches have received significant attention for managing private and critical Identity attributes from the user's perspective. User-centric Identity Management allows users to control their own digital identities. Users are allowed to select their credentials when responding to an authentication or attribute requester and it gives users more rights and responsibility over their Identity information. However, current user-centric approaches mainly focus on interoperable architectures between existing Identity Management systems and privacy issues have not been considered in depth. In this paper, we propose a category-based privacy preference approach to enhance the privacy of user-centric Identity Management systems. In addition, we present our proof-of-concept prototype of our approach in the Identity Metasystem.

  • privacy enhanced user centric Identity Management
    International Conference on Communications, 2009
    Co-Authors: Gail-joon Ahn, Mohamed Shehab
    Abstract:

    User-centric Identity Management approaches have received significant attention for managing private and critical Identity attributes from the user's perspective. User-centric Identity Management allows users to control their own digital identities. Users are allowed to select their credentials when responding to an authentication or attribute requester and it gives users more rights and responsibility over their Identity information. However, current user-centric approaches mainly focus on interoperable architectures between existing Identity Management systems and privacy issues have not been considered in depth. In this paper, we propose a category-based privacy preference approach to enhance the privacy of user-centric Identity Management systems. In addition, we present our proof-of-concept prototype of our approach in the Identity Metasystem.

  • SEC - Portable User-Centric Identity Management
    Proceedings of The Ifip Tc 11 23rd International Information Security Conference, 2008
    Co-Authors: Moo Nam Ko, Mohamed Shehab
    Abstract:

    User-centric Identity Management has recently received significant attention for handling private and critical Identity attributes. The notable idea of usercentric Identity Management allows users to control their own digital identities. Current user-centric Identity Management approaches are mainly focused on interoperable architectures between existing Identity Management systems. Normally, users can access the Internet from various places such as home, office, school or public Internet caf’e. We observe that the importance of portability of the a user’s digital Identity should be addressed in the user-centric Identity Management practices. In other words, users should be able to export their digital identities and transfer them to various computers in a secure manner. In this paper, we focus on the portability issue of the Identity Metasystem and describe three possible types of portabilityenhanced Identity Metasystem model including our implementation experience.

Audun Jøsang - One of the best experts on this subject based on the ideXlab platform.

  • Local user-centric Identity Management
    Journal of Trust Management, 2015
    Co-Authors: Audun Jøsang, Laurent Miralabé, Henning Klevjer, Kent A Varmedal, Jérôme Daveau, Knut Eilif Husa, Christophe Rosenberger, Petter Taugbøl
    Abstract:

    Identity Management is a rather general concept that covers technologies, policies and procedures for recognising and authenticating entities in ICT environments. Current Identity Management solutions often have inadequate usability and scalability, or they provide inadequate authentication assurance. This article describes local user-centric Identity Management as an approach to providing scalable, secure and user friendly Identity Management. This approach is based on placing technology for Identity Management on the user side, instead of on the server side or in the cloud. This approach strengthens authentication assurance, improves usability, minimizes trust requirements, and has the advantage that trusted online interaction can be upheld even in the presence of malware infection in client platforms. More specifically, our approach is based on using an OffPAD (Offline Personal Authentication Device) as a trusted device to support the different forms of authentication that are necessary for trusted interactions. A prototype OffPAD has been implemented and tested in user experiments.

  • trust requirements in Identity Management
    Grid Computing, 2005
    Co-Authors: Audun Jøsang, John Fabre, James Dalziel, Simon Pope
    Abstract:

    Identity Management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of Identity Management, serves to verify claims about holding specific identities. Identity Management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Different Identity Management models will have different trust requirements. Since there are costs associated with establishing trust, it will be an advantage to have Identity Management models with simple trust requirements. The purpose of this paper is to describe trust problems in current approaches to Identity Management, and to propose some solutions.

  • User Centric Identity Management
    2005
    Co-Authors: Audun Jøsang, Simon Pope
    Abstract:

    Identity Management is traditionally seen from the serviceproviders’ point of view, meaning that it is an activity undertaken by the service provider to manage servi ce user identities. Traditional Identity Management systems are designed to be cost effective and scalab le primarily for the service providers, but not necessarily for the users, which often results in poor us ability. Users are, for example, often required to memorise multiple passwords for accessing different ser vices. This represents a minor inconvenience if users only access a few online services. However, with therapid increase in the uptake of online services, the traditional approach to Identity Management is a having serious negative effects on the user experience. The industry has responded by proposing ne w Identity Management models to improve the user experience, but in our view these proposals give lit tle relief to users at the cost of relatively high increase in server system complexity. This paper takes a new look at Identity Management, and proposes solutions that are designed to be cost effective and scalabl e from the users’ perspective, while at the same time being compatible with traditional Identity manag ement systems.

  • ACSW Frontiers - Trust requirements in Identity Management
    2005
    Co-Authors: Audun Jøsang, John Fabre, James Dalziel, Brian Robert Hay, Simon Pope
    Abstract:

    Identity Management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of Identity Management, serves to verify claims about holding specific identities. Identity Management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Different Identity Management models will have different trust requirements. Since there are costs associated with establishing trust, it will be an advantage to have Identity Management models with simple trust requirements. The purpose of this paper is to describe trust problems in current approaches to Identity Management, and to propose some solutions.

Marit Hansen - One of the best experts on this subject based on the ideXlab platform.

  • Privacy and Identity Management
    IEEE Security & Privacy, 2008
    Co-Authors: Marit Hansen, Ari Schwartz, Alissa Cooper
    Abstract:

    Creating and managing individual identities is a central challenge of the digital age. As Identity Management systems defined here as programs or frameworks that administer the collection, authentication, or use of Identity and information linked to Identity are implemented in both the public and private sectors, individuals are required to identify themselves with increasing frequency. Traditional Identity Management systems are run by organizations that control all mechanisms for authentication (establishing confidence in an Identity claim's truth) and authorization (deciding what an individual should be allowed to do), as well as any behind-the-scenes profiling or scoring of individuals. Recent work has looked toward more user-centric models that attempt to put individuals in charge of when, where, how, and to whom they disclose their personal information.

  • Privacy-enhancing Identity Management
    Information Security Technical Report, 2004
    Co-Authors: Marit Hansen, Sebastian Clauß, Andreas Pfitzmann, Peter Berlich, Jan Camenisch, Michael Waidner
    Abstract:

    Abstract Privacy-Enhancing Technologies (PET) are the technical answer to social and legal privacy requirements. PET become constituents for tools to manage users' personal data. Users can thereby control their individual digital Identity, i.e. their individual partial identities in an online world. Existing commercially available Identity Management systems (IMS) do not yet provide privacy-enhancing functionality. We discuss general concepts and mechanisms for privacy-enhancing IMS (PE-IMS) in detail and highlight where existing IMS need to be improved in order to deliver them. Derived from general concepts and incorporating existing mechanisms, we define a component-based architecture for PE-IMS. This architecture describes the basic building blocks a PE-IMS must include, and so it is meant to be used as a fundamental concept for PE-IMS in practice. Finally, we give an outlook on the future development concerning IMS. Identity, Privacy, Identity Management System, Privacy-Enhancing Technologies, PET, Privacy-Enhancing Identity Management System, Multilateral Security

  • Identity Management Systems: Gateway and Guardian for Virtual Residences
    2003
    Co-Authors: Marit Hansen, Peter Berlich
    Abstract:

    Information and Communication Technologies (ICT) expand traditional ways of social interaction and thereby feed back on the society that created them. Users have to navigate their enhanced social context and in doing so legitimately strive to apply familiar concepts such as the notion of residence or the intuitive handling of roles. We introduce the concepts of Virtual Residence and Identity Management Systems and elaborate on their interrelation: Firstly, Privacy-Enhancing Identity Management Systems can implement important features of the Virtual Residence. Secondly, the user may benefit from the residence metaphor being employed as an appropriate interface for Identity Management Systems. We find that the proposed Virtual Residence serves to support the context awareness of users and Identity Management Systems, as well as to enforce certain contextbased behaviour. Identity Management Systems, on the other hand, serve to implement rule-based behaviour and can form the underlying and required Identitymanaging infrastructure of a Virtual Residence. An outlook completes the paper.

Gail-joon Ahn - One of the best experts on this subject based on the ideXlab platform.

  • privacy enhanced user centric Identity Management
    International Conference on Communications, 2009
    Co-Authors: Gail-joon Ahn, Mohamed Shehab
    Abstract:

    User-centric Identity Management approaches have received significant attention for managing private and critical Identity attributes from the user's perspective. User-centric Identity Management allows users to control their own digital identities. Users are allowed to select their credentials when responding to an authentication or attribute requester and it gives users more rights and responsibility over their Identity information. However, current user-centric approaches mainly focus on interoperable architectures between existing Identity Management systems and privacy issues have not been considered in depth. In this paper, we propose a category-based privacy preference approach to enhance the privacy of user-centric Identity Management systems. In addition, we present our proof-of-concept prototype of our approach in the Identity Metasystem.

  • Digital Identity Management - Managing privacy preferences for federated Identity Management
    Proceedings of the 2005 workshop on Digital identity management - DIM '05, 2005
    Co-Authors: Gail-joon Ahn, John Lam
    Abstract:

    We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of Identity is the important component of this vehicle. Identity Management has been recently considered to be a viable solution for simplifying user Management across enterprise applications. The network Identity of each user is the global set of personal credentials and preferences constituting the various accounts. The prevalence of business alliances or coalitions necessitates the further evolution of Identity Management, named federated Identity Management (FIM). The main motivation of FIM is to facilitate the federation of identities among business partners emphasizing on ease of user Management. In this paper, we investigate privacy issues in FIM, especially focusing on Liberty Alliance approach. We attempt to identify practical business scenarios that help us understand privacy issues in FIM. Also, we propose systematic mechanisms to specify privacy preferences in FIM.

Jaap-henk Hoepman - One of the best experts on this subject based on the ideXlab platform.

  • Mobile Identity Management
    2011
    Co-Authors: Jaap-henk Hoepman
    Abstract:

    Identity Management consists of the processes and all underlying technologies for the creation, Management, and usage of digital identities. Business rely on Identity Management systems to simplify the Management of access rights to their systems and services for both their employees and their customers. Users may benefit from Identity Management to simplify logging in to websites and computer systems (single sign-on), as well as streamlining Management of their personal information and preferences (user centricity).Current systems for Identity Management only partially achieve these goals, and still suffer from several security, privacy and usability issues. We will discuss how personal mobile devices (like mobile phones and PDA’s) can be used to overcome this ’Identity crisis’, to increase the security, privacy and usability of Identity Management systems.

  • Communications and Multimedia Security - Mobile Identity Management
    Communications and Multimedia Security, 2011
    Co-Authors: Jaap-henk Hoepman
    Abstract:

    Identity Management consists of the processes and all underlying technologies for the creation, Management, and usage of digital identities. Business rely on Identity Management systems to simplify the Management of access rights to their systems and services for both their employees and their customers. Users may benefit from Identity Management to simplify logging in to websites and computer systems (single sign-on), as well as streamlining Management of their personal information and preferences (user centricity). Current systems for Identity Management only partially achieve these goals, and still suffer from several security, privacy and usability issues. We will discuss how personal mobile devices (like mobile phones and PDA's) can be used to overcome this 'Identity crisis', to increase the security, privacy and usability of Identity Management systems.

  • FIDIS - Comparing Identity Management Frameworks in a Business Context
    The Future of Identity in the Information Society, 2008
    Co-Authors: Jaap-henk Hoepman, Rieks Joosten, Johanneke Siljee
    Abstract:

    Several frameworks for Identity Management exist, each of them with its own distinguishing features. These frameworks are complex however, and their features not easily understood. This makes it hard for businesses to understand the intricacies, and difficult to select and deploy one. This paper develops business selection criteria and applies them to four popular Identity Management frameworks. The resulting score card (1) helps businesses to select and deploy an Identity Management system, and (2) provides valuable feedback to developers of Identity Management systems on the criteria that they should take into account when designing and implementing an Identity Management system that is useful for specific businesses.