Proceedings ArticleDOI
Enabling User Control with Personal Identity Management
Ty Mey Eap,Marek Hatala,Dragan Gašević +2 more
- pp 60-67
TLDR
This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities.Abstract:
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breaches can happen and no identity management system can provide full-proof security. The challenge is even greater in service-oriented architectures where each user has their identities scattered across many services and has no control over management of those identities. Recent research in the area of the user-centric identity management makes user control and consent the key concept for identity management, but there is no consensus on the level of user-centricity. This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities. The advantages of this proposal can be demonstrated through a comparison analysis of relevant identity management systems against a set of criteria required for today's identity management.read more
Citations
More filters
Patent
Method for reading attributes from an ID token
TL;DR: In this paper, the authors propose a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following steps: authenticating the user with respect to the ID tokens, after successful authentication of the user and the first computer system, read-access by the computer system to the at least 1 attribute stored by the user for transfer of the attribute to a second computer system.
Proceedings ArticleDOI
Combining Collaborative Filtering and Semantic Content-Based Approaches to Recommend Web Services
TL;DR: A hybrid approach is presented, coupling pure and classic collaborative-filtering methods and a semantic content-based method that performs Description Logic based reasoning on semantic descriptions of services, in order to analysis semantic similarity of services.
Journal ArticleDOI
Context-Aware Identity Management in Pervasive Ad-hoc Environments
TL;DR: The authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.
Journal ArticleDOI
Identity Model for Blockchain-Based Land Registry System: A Comparison
TL;DR: A detailed literature review consisting of three stages based on three research questions (RQ) that highlight the step-by-step evaluation and analysis is provided in this paper , where the majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems.
Book ChapterDOI
PPM: Privacy Policy Manager for Personalized Services
TL;DR: A new architecture for personalized services that separates access control using a user own privacy policy from data storage for private information, and it supports privacy policy management by users is introduced.
References
More filters
Proceedings ArticleDOI
OpenID 2.0: a platform for user-centric identity management
David Recordon,Drummond Reed +1 more
TL;DR: The OpenID framework is emerging as a viable solution for Internet-scale user-centric identity infrastructure that supports both URLs and XRIs as user identifiers, uses Yadis XRDS documents for identity service discovery, adds stronger security, and supports both public and private identifiers.
The Laws of Identity
TL;DR: The approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity, which define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
Journal Article
Federated Security: The Shibboleth Approach
TL;DR: The most innovative I2MI effort to date is the Shibboleth Project, which supports secure user access to Webbased resources and supports multi-organizational federations to enable scalable use of the technology.
Proceedings Article
Trust requirements in identity management
TL;DR: The purpose of this paper is to describe trust problems in current approaches to identity management, and to propose some solutions.
Proceedings ArticleDOI
User centricity: a taxonomy and open issues
TL;DR: This work investigates the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both pre-dominant classes and explores the feasibility of reaching beyonduser-centricity.