Identity Management Architecture: Paradigms and Models

2010 ◽  
Vol 40-41 ◽  
pp. 647-651 ◽  
Author(s):  
Yuan Cao ◽  
Lin Yang ◽  
Zom Bo Fu ◽  
Feng Yang

This paper provides an overview of identity management architecture from the viewpoint of paradigms and models. The definition of identity management architecture has been discussed, paradigms are classified by the development stage and core design principle transmission of the architecture which include network centric paradigm, service centric paradigm, and user centric paradigm; models are grouped by components varying and functions changing to isolated model, centralized model, and federated model. These paradigms and models have no collisions among them for they are views of identity management from different viewpoint.

Author(s):  
Daisuke Mashima ◽  
David Bauer ◽  
Mustaque Ahamad ◽  
Douglas M. Blough

The pervasive use of digital identities in today’s cyberspace has led to an increasing interest in the area of identity management. Recently proposed user-centric identity management systems have accomplished higher-level of user control over online identity credentials. However, while the lack of a central authority that governs the entire system requires users to be responsible for their own digital identity credentials, the existing user-centric identity management systems still have problems in terms of security, privacy, and system availability. In this chapter, we present an identity management architecture that addresses these problems. Our scheme relies on user-controlled identity agents. Identity agents realize fine-grained control over online identity disclosure by using a minimal-disclosure identity credential scheme and also improve users’ awareness over their credential usage via an identity-usage monitoring system that includes a real-time risk scoring mechanism. A proof-of-concept implementation is shown and evaluated in terms of security, user-centricity, and performance.


Author(s):  
Alexandre B. Augusto ◽  
Manuel E. Correia

The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even personal health records in order to provide a service. In essence, the services are presented as free and constitute a means by which the user is mercantilized, often without realizing the real value of its data to the market. In this chapter the auhors describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a digital identity architecture designed from the ground up to be user centric. OFELIA is an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users’ identity attributes to offer a highly versatile set of identity services but relies instead on having those attributes distributed among and protected by several otherwise unrelated Attribute Authorities. Only the end user, with his smartphone, knows how to aggregate these scattered Attribute Authorities’ identity attributes back into some useful identifiable and authenticated entity identity that can then be used by Internet services in a secure and interoperable way.


Author(s):  
Shalin Hai-Jew

“Pathways to Public Health” involves undergraduate and graduate degrees offered fully online through Kansas State University (K-State) to both meet the needs of traditional-age learners and professionals in the public health field who will need formal credentialing. This curriculum offers learning with global implications and has a wide potential to benefit global learners. In light of this, this chapter explores potential methods for online branding and identity management for this course series as a central analytical aspect of the program’s development and launch. This chapter will address the following issues: an environmental scan of the global public health environment; the definition of the core identity; a branding strategy using the World Wide Web (WWW), Internet, and Web 2.0 affordances (to reach both internal and external “publics”); an initial risk assessment; legal considerations; work implications of the global branding; the engagement of students and graduates in the branding outreach, and the maintenance of this brand over time.


2011 ◽  
pp. 293-322
Author(s):  
Jean-Marc Seigneur ◽  
Christian Damsgaard Jensen

This chapter introduces entification as a means of allowing the users of e-services to create and manage multiple pseudonyms in a decentralized way; thereby limiting the ability to link transactions and users, whilst mitigating attacks due to the ownership of multiple identities. The entification framework fills the gap between the identity and the computational trust/reputation layers. It is difficult to safely assess linked evidence about multiple virtual identities because there might be overcounting of overlapping trust pieces of evidence. The entification framework uses a new mechanism, called trust transfer, to mitigate this issue, and allows the users to trade privacy for trust. Such a framework is essential in a world where more and more e-services want to rely on user-centric identity management.


Author(s):  
Eleni Berki ◽  
Mikko Jäkälä

Information and communication technology gradually transform virtual communities to active meeting places for sharing information and for supporting human actions, feelings and needs. In this chapter the authors examine the conceptual definition of virtual community as found in the traditional cyberliterature and extend it to accommodate latest cybertrends. Similar to the ways that previous social and mass media dissolved social boundaries related to time and space, cyber-communities and social software seem to also dissolve the boundaries of identity. This, in turn, questions the trust, privacy and confidentiality of interaction. The authors present a way of classifying and viewing self-presentation regarding cyber-identity management in virtual communities. It is based on the characteristics that cyber-surfers prefer to attribute to themselves and accordingly present themselves to others. In so doing, the authors coin the terms for five distinct phenomena, namely nonymity, anonymity, eponymity, pseudonymity and polynymity. They subsequently compare and contrast these terms, summarising information from their investigation, and outlining emerging questions and issues for a future research agenda.


Author(s):  
Bart Priem ◽  
Eleni Kosta ◽  
Aleksandra Kuczerawy ◽  
Jos Dumortier ◽  
Ronald Leenes

Sign in / Sign up

Export Citation Format

Share Document