A Comparative Survey of Cloud Identity Management-Models

Author(s):  
Bernd Zwattendorfer ◽  
Thomas Zefferer ◽  
Klaus Stranacher
Author(s):  
Kenneth J. Giuliani ◽  
V. Kumar Murty

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.


Author(s):  
Ivonne Thomas ◽  
Christoph Meinel

One of the main reasons is the problem of establishing trust relationships between independent parties—a problem inherent to open environments with multiple trust domains. In open environments, participants often do not know each other, but nevertheless require an existing trust relationship to perform critical transactions. Governments, commercial organizations, and academia alike have addressed this issue by providing better assurance guidelines for identity management. The outcome is a number of identity assurance frameworks that identify and cluster certain security criteria into levels of trust or levels of assurance (LoA). These approaches are described, compared, and assessed with regard to their role towards a reliable identity management across the Internet. Limitations are identified and trust levels for attributes are proposed as potential fields for further research.


2021 ◽  
Vol 2021 ◽  
pp. 1-26
Author(s):  
Reza Soltani ◽  
Uyen Trang Nguyen ◽  
Aijun An

Self-sovereign identity is the next evolution of identity management models. This survey takes a journey through the origin of identity, defining digital identity and progressive iterations of digital identity models leading up to self-sovereign identity. It then states the relevant research initiatives, platforms, projects, and regulatory frameworks, as well as the building blocks including decentralized identifiers, verifiable credentials, distributed ledger, and various privacy engineering protocols. Finally, the survey provides an overview of the key challenges and research opportunities around self-sovereign identity.


2004 ◽  
Vol 21 (2) ◽  
pp. 89-94 ◽  
Author(s):  
J.-P. Tourtier ◽  
M. Compain ◽  
F. Petitjeans ◽  
T. Villevieille ◽  
J.-F. Chevalier ◽  
...  

2013 ◽  
Author(s):  
Brittan Davis ◽  
Tiffany Williams ◽  
Donna E. Schultheiss

Sign in / Sign up

Export Citation Format

Share Document