An Examination of Identity Management Models in an Internet Setting

Author(s):  
Kenneth J. Giuliani ◽  
V. Kumar Murty

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.

2021 ◽  
Author(s):  
Maha Aldosary ◽  
Norah Alqahtani

Efficient identity management system has become one of the fundamental requirements for ensuring safe, secure, and transparent use of identifiable information and attributes. FIdM allows users to distribute their identity information across security domains which increase the portability of their digital identities. However, it also raises new architectural challenges and significant security and privacy issues that need to be mitigated. In this paper, we presented the limitations and risks in Federated Identity Management system and discuss the results and proposed solutions.


2021 ◽  
Vol 40 (1) ◽  
pp. 129-139
Author(s):  
T. Alese ◽  
O. Owolafe ◽  
A.F. Thompson ◽  
B.K. Alese

The rapid growth in the number of online services has lead to an increasing number of different identities managed by each user that makes people feel overloaded and suffer from password fatigue. This poses a serious problem and makes people unable to control and protect their digital identities against identity theft. As organizations grow and adds services such as ecommerce and global remote access of services, controlling who is accessing what kind of information is also becoming a difficult task. This research therefore, presents the development of a user identity management system for cybercrime control. The four stages of an identity management life cycle were developed using some mathematical tools. A two-factor authentication technique was used in developing the system, the traditional username and password was also included with biometric features for robustness. A simulation was run on the model for users ranging from 10 to 1000 using life wild dataset, and accuracy was found to be 98.01%.


TEM Journal ◽  
2020 ◽  
pp. 1338-1347
Author(s):  
Belkacem Athamena ◽  
Zina Houhamdi

This paper describes the identity management system (IdMS) by defining system and user requirements. Additionally, it introduces the IdMS concept that approaches the things identity management. Moreover, the paper deeply describes the IdMS features using unified modelling language (UML) diagrams such as class, system, and sequence diagrams to show the main system functionalities. Ultimately, the suggested system is evaluated by comparing it with the existing systems and discussing the fulfilment of user and system requirements.


Author(s):  
A. Shobanadevi ◽  
Sumegh Tharewal ◽  
Mukesh Soni ◽  
D. Dinesh Kumar ◽  
Ihtiram Raza Khan ◽  
...  

Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


Sign in / Sign up

Export Citation Format

Share Document