scispace - formally typeset
Proceedings ArticleDOI

Enabling User Control with Personal Identity Management

TLDR
This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities.
Abstract
Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breaches can happen and no identity management system can provide full-proof security. The challenge is even greater in service-oriented architectures where each user has their identities scattered across many services and has no control over management of those identities. Recent research in the area of the user-centric identity management makes user control and consent the key concept for identity management, but there is no consensus on the level of user-centricity. This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities. The advantages of this proposal can be demonstrated through a comparison analysis of relevant identity management systems against a set of criteria required for today's identity management.

read more

Citations
More filters
Patent

Method for reading attributes from an ID token

TL;DR: In this paper, the authors propose a method for reading at least one attribute stored in an ID token, wherein the ID token is assigned to a user, comprising the following steps: authenticating the user with respect to the ID tokens, after successful authentication of the user and the first computer system, read-access by the computer system to the at least 1 attribute stored by the user for transfer of the attribute to a second computer system.
Proceedings ArticleDOI

Combining Collaborative Filtering and Semantic Content-Based Approaches to Recommend Web Services

TL;DR: A hybrid approach is presented, coupling pure and classic collaborative-filtering methods and a semantic content-based method that performs Description Logic based reasoning on semantic descriptions of services, in order to analysis semantic similarity of services.
Journal ArticleDOI

Context-Aware Identity Management in Pervasive Ad-hoc Environments

TL;DR: The authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.
Journal ArticleDOI

Identity Model for Blockchain-Based Land Registry System: A Comparison

TL;DR: A detailed literature review consisting of three stages based on three research questions (RQ) that highlight the step-by-step evaluation and analysis is provided in this paper , where the majority of these papers focus on assessing the identity issues related to the land registry system and reviewing the existing identity models to find the best possible identity model to resolve the identified identity problems.
Book ChapterDOI

PPM: Privacy Policy Manager for Personalized Services

TL;DR: A new architecture for personalized services that separates access control using a user own privacy policy from data storage for private information, and it supports privacy policy management by users is introduced.
References
More filters
Proceedings ArticleDOI

OpenID 2.0: a platform for user-centric identity management

TL;DR: The OpenID framework is emerging as a viable solution for Internet-scale user-centric identity infrastructure that supports both URLs and XRIs as user identifiers, uses Yadis XRDS documents for identity service discovery, adds stronger security, and supports both public and private identifiers.

The Laws of Identity

Kim Cameron
TL;DR: The approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity, which define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
Journal Article

Federated Security: The Shibboleth Approach

TL;DR: The most innovative I2MI effort to date is the Shibboleth Project, which supports secure user access to Webbased resources and supports multi-organizational federations to enable scalable use of the technology.
Proceedings Article

Trust requirements in identity management

TL;DR: The purpose of this paper is to describe trust problems in current approaches to identity management, and to propose some solutions.
Proceedings ArticleDOI

User centricity: a taxonomy and open issues

TL;DR: This work investigates the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both pre-dominant classes and explores the feasibility of reaching beyonduser-centricity.