Trust Federation of Identity Management in Distributed Environment

2012 ◽  
Vol 605-607 ◽  
pp. 2574-2578
Author(s):  
Dong Mei Li ◽  
Yong Hong Wang ◽  
Jian Yong Chen

Identity management systems in Internet belong to different circles of trust and it is difficult to set up trust relationship among Identity Providers (IdPs) or Service Providers (SPs) which are located in different circles of trust. This paper proposes a distributed trust federation framework to solve the problem and its efficiency is analyzed with several experiments. It uses IdPs which belong to multiple Circles of Trust (CoTs) as relay entities to set up trust relationship among CoTs. The proposed framework is effective to extend the trust federation of identity management systems and thus improve easy of use for users in Internet..

Author(s):  
Ivonne Thomas ◽  
Christoph Meinel

One of the main reasons is the problem of establishing trust relationships between independent parties—a problem inherent to open environments with multiple trust domains. In open environments, participants often do not know each other, but nevertheless require an existing trust relationship to perform critical transactions. Governments, commercial organizations, and academia alike have addressed this issue by providing better assurance guidelines for identity management. The outcome is a number of identity assurance frameworks that identify and cluster certain security criteria into levels of trust or levels of assurance (LoA). These approaches are described, compared, and assessed with regard to their role towards a reliable identity management across the Internet. Limitations are identified and trust levels for attributes are proposed as potential fields for further research.


2018 ◽  
Vol 9 (1) ◽  
pp. 63-78 ◽  
Author(s):  
Vikas Kumar ◽  
Aashish Bhardwaj

This article describes how in today's digital world, customers have made it a common practice to maintain user accounts with different service providers to access a range of services. In such environment, all attributes of the identity must be verified to operate, otherwise the resources would be vulnerable to financial and data loss. This article contends that makes it important to form an Identity Management System, which could provide central administration, user self- service, role based access control and integrated user management. Identity Management becomes very much vital for the environment working with multiple technologies, as it governs an entity (i.e. a human or a software agent) to authenticate and authorize for accessing the network via multiple technologies. Successful Identity Management increases the efficiency, security, access control and decreases the complexity, cost and many repetitive works. Essential features of present day identity management systems have been identified in the present work. A comparative analysis of these identity management systems has been carried out to establish the present-day industry practices. Along with that, specific challenges to the present-day identity management systems have been identified. The article helps in the identification of suitable Identity Management System for specific applications.


Author(s):  
Reema Bhatt ◽  
Manish Gupta ◽  
Raj Sharman

Identity management is the administration of an individual's access rights and privileges in the form of authentication and authorization within or across systems and organizations. An Identity Management system (IdM) helps manage an individual's credentials through the establishment, maintenance, and eventual destruction of their digital identity. Numerous products, applications, and platforms exist to address the privacy requirements of individuals and organizations. This chapter highlights the importance of IdM systems in the highly vulnerable security scenario that we live in. It defines and elaborates on the attributes and requirements of an effective identity management system. The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models. The latter part of this chapter elaborates on some of today's most popular IdM solutions.


Sign in / Sign up

Export Citation Format

Share Document