Building Privacy into the Infrastructure: Towards a New Identity Management Architecture

2016 ◽  
Author(s):  
A. Michael Froomkin
2010 ◽  
Vol 40-41 ◽  
pp. 647-651 ◽  
Author(s):  
Yuan Cao ◽  
Lin Yang ◽  
Zom Bo Fu ◽  
Feng Yang

This paper provides an overview of identity management architecture from the viewpoint of paradigms and models. The definition of identity management architecture has been discussed, paradigms are classified by the development stage and core design principle transmission of the architecture which include network centric paradigm, service centric paradigm, and user centric paradigm; models are grouped by components varying and functions changing to isolated model, centralized model, and federated model. These paradigms and models have no collisions among them for they are views of identity management from different viewpoint.


Author(s):  
Ivan Milenković ◽  
Olja Latinović ◽  
Dejan Simić

Abstract: Today, identity management systems are widely used in different types of organizations, from academic and government institutions to large enterprises. An important feature of identity management systems is the Single Sign-On functionality. Single Sign-On allows users to authenticate once, and freely use all services and resources available to them afterwards. In this paper, we present the usage of Kerberos in identity management systems. An overview of Kerberos protocol, state of the art of identity management systems and different generic architectures for identity management is given in the paper. Also, we present a Single Sign-On identity management architecture proposal based on Kerberos protocol, and discuss its properties. Special attention was given to authentication, authorization and auditing.


Author(s):  
Peter White

The chapter argues that an enterprise should develop its own Identity Management Architecture (IdMA) before attempting any Identity Management implementation. It begins with a discussion of the development of the Reference IdMA. It also discusses the issues of how to incorporate existing enterprise workflows and processes and other specific needs of an enterprise into an IdMA. It proposes the incorporation of existing information security controls into the IdMA by the use of chokepoints to monitor identified security hotspots. The issues surrounding the privacy of personal data as well as the protection of corporate data and assets are discussed and it is shown how these issues may be addressed and included in the Reference IdMA. Finally, there is a discussion of how to include federation with other enterprises as part of the enterprise’s IdMA.


Sign in / Sign up

Export Citation Format

Share Document