You are on page 1of 7

A Survey of Identity Management Technology

Yuan Cao Lin Yang


School of Computer Science, National University of The Research Institute, China Electronic Equipments &
Defense Technology System Engineering Corporation
Changsha, Hunan, China Beijing, China
E-mail: dolf.cao@gmail.com E-mail: yanglin61s@yahoo.com.cn

Abstract—This paper presents a survey of identity synchronizations of users’ identities while do some
management from the perspectives of development stages and operations on users (such as add new user, modify user’s
functions variety of Identity Management. The definition and information and delete an old user) is quite hard in many
core concepts of identity and identity management have been different system. (2) Low security level, they’re easy to lost
discussed deeply. Identity Management models including and forget especially there are so many malicious software
isolated model, centralized model, and federated model are like key logging, phishing and pharming (DNS Poisoning)
grouped by components varying and functions changing. on the Internet; (3) Low authentication strength, these
Based on the transformation of core design principles, identities can’t support strong and joint authentication; 4)
paradigms of identity management are classified into network
low relation and correlation between identities and user
centric paradigm, service centric paradigm, and user centric
paradigm. Comparisons of these paradigms and models have
privilege.
been presented. And we give a rough classification of current Two broad issues exist today with regards to identity on
systems to the corresponding paradigms and models. the Internet: safety, including security and privacy, and
convenience. Problems that exist in today’s online identity
Keywords-identity management; paradigms; models systems can fall into one or both of these categories.
Problems of identity [9] include unreliable identification of
subjects, account management, inconsistent user experience,
I. INTRODUCTION
and lack of federation, security weakness, and vast
People’s daily life relies on the online services more and propagation of sensitive information.
more for the fast development of IT Technology. Credentials People bring forward Identity Management (IdM) to
of users must be provided to the service provider (SP) in protect users’ identities. The goal of IdM is to give every
order to prove truthfulness of their identity while using entity in a system an identity, which is closely interrelated to
online services. Scarcity of transparency while exchanging the entity privilege and constraints, implement access control
people’s identity information makes it hard for the people to the system resource. IdM supports the following
participate in the protection process of their personal identity requirements: 1) end-user requirement, including self service,
and related information, and most of these protection works SSO, security and privacy, mobility; 2) network operator
have been done by the SP. requirement, including identity management server,
There are two major threatens in face of user’s identity: flexibility and good performance, support and management
˄1) Identity theft [1-3], attacks on identity make the theft of mobility, security; 3) SP requirement; 4) administrative
easier to gain profits from the stolen identity information; requirement; 5) legal requirement.
Identity theft happens a lot especially when the This paper is organized as follows: in Chapter 2 gives a
authentication methods are not safe and strong enough. In detail definition and core concepts of identity and IdM;
February 2008, the Consumer Sentinel, a Federal Trade Chapter 3 discusses the models of IdM and Chapter 4 gives a
Commission (TFC) complaint database gave a statistic of classification of IdM paradigms; Chapter 5 presents the
identity theft events in 2007, Consumer Sentinel received conclusion.
over 800,000 consumer fraud and identity theft
complaints[4]; (2) Identity disclosure[5, 6], many of user’s II. DEFINITION AND CORE CONCEPTS OF IDM
extra information may be recorded by applications and As we mention IdM, we must have clear understanding of
services without notifying users, this can cause serious identity and concepts of IdM.
information abuse. Users can’t control the extra information,
knowing nothing about who can acquire the information, and A. Identity
can’t assure how these indirect receivers will use the It’s hard to give a precise definition of identity; the
information. specific definition of identity should considering different
The identities of users provided by applications and applied environments, semantic contexts and usages of
services mainly include username/password, certificates, identity. Generally, an identity is the representation of an
tokens, biometrics [7], devices, and so on [8]. These entity in a particular context [10] and it consists of identifiers
identities have many problems in actual use: (1) and credentials (attributes of identifiers, like password, user
Discommodious to use. They’re hard to support features like profiles) of the users. In a long time, people treat digital
single sign on (SSO) and cross domain access, and identity the same as the identity in real life [11]: 1) who we
___________________________________
978-1-4244-6943-7/10/$26.00 ©2010 IEEE


are, name, membership, birthday; 2) our hobbies, clothes, surrounding the creation, maintenance, and use of digital
activities, foods; 3) our reputation, honesty, crime and so on. identities for people, systems, devices and services. It
But the applications and services only focus on or care about combines processes and technologies to secure and manage
some attributes of a user which have high relevancy with access to an organization's resources and assets’. Li Jian
applications and services in practice, these attributes directly et[19] presents IdM as follows: in order to reduce the cost of
influence whether the critical processes of applications and manage users’ identities and access privilege, for the purpose
services can be finished or not. It’s irrational and of improve security and privacy, information sharing, work
unnecessary to make digital identity and identity in reality efficiency, security performance, IdM is an infrastructure of
equal. identity authentication and authorization management
Identity has been defined as ‘the distinct character or developed from new technology.
personality of an individual. Consists of traits, attributes, and IdM integrates many technologies used in user identity
preferences upon which one may receive personalized management and resource access control; it includes the
services’ [11]. Kim Cameron defines identity as ‘digital whole process of user identity creation, maintenance,
identity refers to the aspect of digital technology that is deletion which is the lifecycle of identity, in this paper, we
concerned with the mediation of people's experience of their define IdM as follows: IdM is the policies, rules, methods
own identity and the identity of other people and things’ [12]. and systems that implement identity authentication,
In order to give a meticulous protection, identity was divided authorization management, access control, and operation
into nyms identity and partial identity[3, 13], nyms identity audit based on digital identity.
‘gives a user an identity under which to operate when
interacting with other parties’ while partial identity C. Core Concepts
‘encompass a set of properties, such as name, birth date, 1) User, SP and IdP
credit-card-numbers, biometrics, transaction histories, The core concept of IdM includes user, SP [20] and
referred to as identity attributes or identifiers, which are identity provider (IdP).
associated with individuals’. And this paper [3] also divides User: User is the client of both SP and IdP. User must
identity to strong identity and weak identity, while strong have a legal identity if it wants to use services. User could be
identity relates to ‘uniquely identify an individual in a a public organization, a human, a virtual entity like software,
population’ and weak identity refers to some common and so on. The only unique identity represents the user.
attributes of user. The uniqueness of an identity determines SP: In IdM, service provider provide services to the user,
the strength of the identity; many weak identities’ people can use any kind of services such as e-bank and
combinations can be treated as a strong identity. shopping provided by SP.
Based on the understanding of these definitions, we IdP: IdP is the core of IdM systems. IdP provide different
summarize the definition of identity as follow. Identity is the trust level to different type of user, for example, an ordinary
representation, proofs and credentials of user entity which user and a manager in a same company should have quite
should be provide to applications and services, it’s different trust level. IdP mainly has two functions, first it
corresponding to particular contexts and being used by should implement services for users like user registration,
applications and services to distinguish users from each other verification reality of user identity and user identity storage.
and provide different privileges to different users. Second, IdP must process requests from SP and users for
authentication.
B. IdM
2) IdP Types
Dabrowski and Pacyna give a definition of IdM as the Mostly, there are four kinds of IdP while classified by
system and framework used in computer or communication functionality:
systems to control identity [14]. IdM includes trust x Credential Identity Service. This type IdP uses
relationship build on identity, verification of entity credentials as user identity for user authentication.
authenticity, authorization of access control, secure transfer Credentials are the proof of user, the earliest and
of identity attributes, lifecycle management of identity, most popular credential is certificate based on ITU-T
administration of work flow while exchanging identity and X.509.
federation of identity between different domains and x Identifier identity service. Identifier is the
dynamic trust delegations. Netha [15] defines IdM as ‘an representation of user, it could be a name, an email
integrated system of business processes, policies and account or ID-Card Number assigned with user.
technologies that enables organizations to facilitate and Identifiers could be directly or indirectly assigned
control user access to online applications and resources - with users, an example of indirect identifier is temp
while protecting confidential personal and business identity of the user, while user need cross domain
information from unauthorized users’. And Lee defines IdM access, IdP always generate this kind of identity and
as the resource access control and identity information allocate it to the user.
management implemented with new technology, the goal of x Attribute Identity Service. Attribute is the
IdM is to cut off the cost of manage users and their identities, information which can be used to describe user
attributes and access privilege to improve productivity and identity; it could be part of credential or process of
security[16]. HP OpenView [17, 18] defines IdM as ‘the set identifier assignment, such like name, address, and
of principles, processes, tools, and social contracts contact information and so on. The IdP should


provide the mechanism for user identity attribute with two or more paradigms, and one paradigm may have
verification, this requires the IdP must has interface more than one type of models too.
with government supervision department.
A. Isolated Model
x Pattern Identity Service. Pattern identity means the
IdP uses patterns, reputation, honor, trust records and In isolated model, SP plays the role of service provider
history access records to descript or identify user and identity provider which means all identity storage and
identity. Some kinds of special pattern identity user operations are done by the single server. The unique
service can be used to maintain computer security, identity allocation, deletion, modification, authentication and
for example, the characteristics of an attacker model authorization are implemented in the SP. Each user will have
can be used to identify the hacker attack. separate credentials such as identity associated passwords or
The differences between these four kinds of IdP identity biometrics. SP acts as identifier provider, credential provider
service is not obvious, a credential always has a and attribute provider. This model is illustrated in Fig. 1
corresponding identifier, and this will involve both credential below.
identity service and identifier identity service. Actually, what This model is quite simple, but it has many problems,
kind of identity service should be used and whether combine with the explosive growth of online services, users have to
two or more services together always depend on what trust manage more and more identities information. More and
level the IdM need. For example, for web access and other more credentials such as usernames and passwords should be
common services, identifier identity service is enough, but managed properly by users. Lost or simply fear lost of
for high level services like online banking services, the credentials specially forgotten passwords create a huge
appropriate credentials are also needed. obstacles to usage, bringing out that many services can’t be
fully functional. The cost of Password recovery will increase
III. MODELS OF IDM the cost of SP especially if services need high security level.
Reference [21] gives a classification of IdM models
which are centralized model and federated model. With the
centralized model ‘consolidates both authentication and
attributes in only one site’ and federated model keeps and
manages each user database in every SP. In [22], the models
of IdM were categorized into isolated, centralized, and
distributed. And IdM was classified into common SP model,
isolated SP model, and personal SP model based on the
storage place of identities and SP types in [23].
When consider classification of IdM models, we think
service composition, SP types, identity storage, IdP types,
user control over identity and privacy protection as criterions.
In this paper, IdM has been classified into three types of
model, isolated model, centralized model, and federation Figure 1. Isolated model
model.
While isolated model can only provide single service to B. Centralized Model
users, all identities are stored in one single SP and IdP, the
Centralized model is implemented in a C/S model, user
functions of SP and IdP are integrated together and no
identity storage and user authentication is both implemented
privacy protection and user control of identities; Centralized
in the same servers called IdP. Different from isolated model,
model is quite similar to the isolated model, the key
this model separates functions of SP and IdP. SPs don’t store
differences between centralized and isolated models are that
user identities locally; all identities are sent to the center IdP
centralized model separates functions of SP and IdP, they are
for storage and following authentication. All SPs use the
not integrated together. The identity and credential is also
global unique IdP. This model can be implemented in many
unique in the two models.
different ways. As mentioned in [23], it includes the
In the formal two models, identities are stored centralized,
common identifier model, the meta-identifier model, and the
in the SP or IdP. This brings out problems such as identity
SSO model. Fig. 2 shows the centralized model, all the
theft, privacy protection and single point of failure.
identities of every SP are stored in IdP, when the SP need to
Federated model allows every SP to store part of users’
authenticate an user, it will send the user information to the
identities, and it can provide single sign on and cross domain
IdP to finish the process.
access with combination of different services. IdP is still
There are many IdM systems implemented in centralized
centralized and only store part of identities, it mainly
model, such as PKI [24], Kerberos [25], CAS [26] and so on
implements identities mapping and access privilege
in the early stage of IdM.
delegation. But federated model still has many shortcomings
Centralized model is suitable for the requirements of
mainly user information disclosure and privacy protection.
managing a lot of users, but it has many disadvantages, store
There are no collisions between classifications of IdM
all identities in only one IdP mainly brings the problem of
models and paradigms, one model could be implemented


privacy protection. It can’t support user privilege delegation
and cross domain access well.

Figure 2. Centralized model

C. Federated Model
The centralized model requires all users in the same
domain, but users always need cross domain or network
access. The federated model integrates different domains Figure 3. Federated model
together and makes it as a global unique domain virtually.
Federation can be defined as the set of agreements, Many papers have discussed problems and challenges
standards and technologies that enable a group of SPs to that federated model faced. Reference [33] discuss
recognize user identities from other SPs with in a federated shortcomings of federated model which are limitations to
trust domain [27]. Protocols include policy and technology web services, persistent data storage, federation security and
standards are established between SPs so that identities from privacy control, syntax and semantics of attributes. For the
different identity domains can be recognized over all first one – limitation to web services seems has been solved,
domains. There is a mapping among different identifiers federated model now supports not only web services but also
owned by the same user in different domains, this mapping some not fully web enabled services like file storage and so
makes that users from one domain can access services in on. As the appearance of cloud storage, persistent data
another domain securely and seamlessly, and no need for storage seems has been solved too. But federation security
other authentications. When a user is authenticated to one SP and privacy control, semantics of attributes still are the
using one of their identifiers, they are considered to have problems federated model faces today. Based on identity
been identified and authenticated with all the other service lifecycle which includes identity issuance, identity usage,
providers as well. Users can still have separate identifiers for identity modification, and identity revocation, Bertino
different SPs. While users want to access all services in the discusses shortcomings of federated model [34]. In the
federated domain, a single identifier and credential is enough. identity issuance stage, whether the identity has been
SSO in federated and centralized model is quite different; correctly enrolled and stored in the IdP is not sure. Identity
federated model supports cross domain SSO while usage always faces problems of misusage. It’s not that
centralized model only implements SSO in one domain. flexible to update or modify user identities. Current federated
The federated model is illustrated in Fig. 3. As we can models lack effective mechanisms to keep consistency and
see, all user identifiers and credentials can play the role of correctness of user information while revoke a user.
Global Virtual Identity; the whole IdM system is transparent Balasubramaniam gives the challenges of current federated
to the user and acts as a Global Virtual SP. Every SP can IdM systems which are establishing trust between IdPs,
store user identities locally and have its own identity providing identity token translation services, synchronizing
database; the IdP only has a limited identity database for the identity information across IdPs, agreeing with federation
purpose of federation. partners on data ownership issues, minimizing risk and
Protocols, standards and systems for federated model financial implications, ensuring compliance with regulatory
include the OASIS [28] Security Assertion Markup requirements, preventing privacy violations, agreeing on
Language (SAML) [29], WS-Federation [30], and the governance policies and enforcement [35].
Liberty Alliance framework [31]. Shibboleth [32] is an open
source project of the federated model. D. Summary
In this section, considering SP type, IdP type, service
composition, cross domain access, identity storage, user


control over identity and privacy protection aspects in IdM limited to a single domain; cross domain access and user
models, we give a comparison of the formal three models control over identity have little support; it has some
and it’s summarized in Table II. mechanisms in privacy protection but not that strong.
As we can see in the table, isolated model only supports Federated model supports multi SPs, multi IdPs and multi
integrated single SP while SP is IdP and single service; it services from different domains; It can provide fully support
doesn’t support cross domain access and user control over of cross domain access and give users a lot of control on
identity; Identities are stored on SP (IdP) and nearly has no their identities; identities in this model can be stored on both
privacy protection. Centralized model supports multi SPs but SPs and IdPs and this model provide strong privacy
only single IdP, it supports multi services composition but protection mechanisms.
TABLE I. COMPARISON OF IDM MODELS
User
Service Cross Domain Identity
Model SP Type IdP Type Control over Privacy Protection
Composition Access Storage
Identity
Single SP and Single IdP and Few and very weak
Isolated Sole service No support On SP No control
IdP, SP is IdP SP, IdP is SP protection
Multi services but
Centralized Multi SPs Single IdP Limited support On IdP Few control Much but weak protection
in the same domain
Multi services form Nearly fully On both SPs Much and strong
Federated Multi SPs Multi IdPs Much control
multi domains support and IdPs protection

IV. PARADIGMS OF IDM B. Service Centric Paradigm


Mullyniemi[36] gives a rough division of IdM systems As more and more services are provided for users on the
based on the intended domain and magnitude of the existing Internet or locally available, sometimes SPs should have the
IdM solutions. The division contains three subcategories: ability to dynamically determine which service users should
federated IdM, small-scale IdM and proprietary IdM. use especially when services are added to an IdM system
Although the division is very rough, it provides a very dynamically. It’s hard to implement this feature in network
good view of IdM systems. In this paper, according to the centric paradigm IdM.
development stages of IdM and transfer of IdM core subject, Service centric paradigm IdM is composed of services
we think there are three paradigms of IdM, mainly including from different providers across multiple domains; these
network centric paradigm, service centric paradigm and user services are not necessarily under control of their providers.
centric paradigm. These paradigms are not isolated with each This paradigm can achieve dynamic replacement of services.
other; links among them are close although there are clear Paper [38] gives a good example of calendar service, if users
boundaries among each other. need to access the calendar service on line, the actual
calendar being accessed (e.g., Google Calendar, Microsoft
A. Network Centric Paradigm Exchange) will depend on the preference of the specific user.
Network centric paradigm occurs in the early If a new calendar service enters into the market, service
development stage of IdM technology. It has been widely centric paradigm IdM have to adapt this new service at
used and been proved to be effective in the early network runtime. Moreover, this paradigm should provide a way for
centric services and applications. In this paradigm, identity the user to dynamically and explicitly delegate his access
creation, management and deletion have nothing to do with rights to the new calendar service.
the access or entitlements; the IdM System is established and In service centric paradigm IdM, organizations will
operated by a single entity for a fixed user and resource evolve their systems to provide more and more services, so
community. It’s not service-related or user-related. An IdM can offer a broader range of applications and becomes
example of network centric paradigm IdM is a Microsoft more critical. The scope of IdM extends to all online
Windows domain [37] governed by a set of predefined resources in an organization, including devices, network
administrators and domain controller (DC) servers. equipments, servers, portals, content, applications and
In this paradigm, identity model can be derived from a products, user credentials, address directory, authorization,
small set of axiomatic principles, such as ever identity in an and telephone numbers.
abstract namespace is unique and distinctive; every entity has There are two challenges in implementing service centric
its corresponding identity. This paradigm doesn’t consider IdM paradigm mainly. First, it’s hard to achieve composition
the identity application scenarios, and doesn’t subject to the of services from different SPs and domains, these services
restrictions of the applying scenarios. An entity may have may have quite different access control mechanisms and
several identities; every identity may have several identifiers trust levels; second, delegations of users’ access rights from
or attributes. one service to another are not easy and users’ behaviors is
Network centric paradigm has many limitations. It hard to track and control.
doesn’t support attributes extension and federation, and the C. User Centric Paradigm
semantics of the attributes haven’t been take into
consideration. People gradually give up the network-centric Service centric IdM paradigm can support functions like
IdM for these reasons in real applications and services. SSO, access delegation and so on which can facilitate users


at a certain degree, but users are not the central of the capacity constraints, people pay little attention to IdM and it
paradigm, they can’t take part in the protection of their doesn’t exposed many problems in the initial stage of
identities. network applications and services.
User centric IdM paradigm treats users as the central and As the popularity of network applications and services,
it’s the principle of design IdM. This paradigm shifts the more and more people use these services and problems such
control of digital identities from SPs to the users by putting as cross domain access, SSO and privacy protection were
the users into the middle of transactions between identity exposed in the IdM, and so service centric IdM paradigm
providers and relying parties. By allowing users to control was proposed based on network centric IdM paradigm in
their own identities, users can decide which identities are order to solve these problems. This paradigm composes
needed to share with other trusted parties and under certain some services and can provide better and unified user
circumstance. experience and solves cross domain access problems. But
This paradigm makes a satisfaction of users’ all privacy protection and identity life cycle management
requirements; implements life cycle management of user haven’t been well implemented. So user centric paradigm
identities, privacy protection and identities disclosure. comes out.
There are many projects trying to implement user centric In fact, service centric paradigm has solved many
paradigm: OpenID [39, 40], Windows CardSpace [41], and problems in IdM, but users still have little control on their
Lightweight Identity (LID) [23], Simple Extensible Identity identities and user experience is not that good. The main
Protocol (SXIP) [42], Higgins [43] and so on. difference between user centric and service centric paradigm
is what the core of IdM is, user or service.
D. Summary In this section, we give a comparison of these three
The network centric paradigm IdM has always been used paradigms of IdM from three aspects: centralization, trust
in the early stage of Internet applications and services, and domain and identity handling methods which includes
IdM is not the core but play a supplementary role in authentication method, identity number scale, identity
applications and services. IdM issues are not been taking into uniqueness, and credentials transmission. Table  gives the
consideration in the design of applications and services comparison of these paradigms.
specially security aspects of IdM itself. By the network's
TABLE II. COMPARISON OF IDM PARADIGMS
Identity Handling
Paradigm Centralized Trust Domain
Authentication Identity Number Scale Identity Uniqueness Credentials Transmission

Few transmission, face


problems of credentials
Single Unique; a single
Network Centric Centralized Sole Small scale disclosure and privacy
Method identity
protection, and no
solution
Support of Many transmission, face
Centralized many problems of credentials
Unique; Main
combine with centralized disclosure and privacy
Service Centric Multiple Large scale identity and some
partly and few protection, but security
affiliated identities
distributed distributed than network centric
mehods paradigm
Lots of transmission, face
Support of
problems of credentials
Centralized centralized Unique; Main
disclosure and privacy
User Centric combine with Multiple and Large scale identity and some
protection, but security
distributed distributed affiliated identities
than service centric
mehods
paradigm
IdPs, identity storage methods, whether to support cross
V. CONCLUSION domain access or not, user control over identity, and
This paper briefly summarizes the development of IdM privacy protection.
technology; we first examine the definition and core IdM technology still faces many formidable challenges.
concepts of IdM, then three paradigms has been bring Obstacles to the development of IdM come from the
forward which are network centric paradigm, service original technology, systems, architecture and even in the
centric paradigm, and user centric paradigm based on the habit of users. Secure user information exchanging among
core design principles transmission of IdM and growing different SPs and IdPs is still a hot point of current
importance of IdM in services and applications. While research and has many difficulties in practice; privacy
considering different implementations of IdM, we protection is always a serious problem from the beginning
classified current IdM protocols, standards, and systems of IdM coming out and is quite hard to overcome.
into three models – isolated model, centralized model, and
federated model based on functions variety of SPs and


REFERENCES International Conference on Emerging Security Information,
Systems, and Technologies (SecureWare 2007), Valencia, pp. 132-
[1] E. Aaron, "Online Identity Theft: Phishing Technology, 138, 2007.
Chokepoints and Countermeasures," http://www.antiphishing.org/
Phishing-dhs-report.pdf, 2005 [21] T. Miyata,, Y. Koga,, P. Madsen,, and S. Adachi,, "A Survey on
Identity Management Protocols and Standards," IEICE -
[2] Daniel J. Solove, "Identity Theft, Privacy, and the Architecture of Transactions on Information and Systems, vol E89-D, pp. 112-123,
Vulnerability," Hastings Law Journal, Vol 54, pp. 1227, 2003. January 2006
[3] B. Elisa, P. Federica, and S. Ning, "Keynote2: Digital Identity [22] G. Ahn,, and M. Ko,, "User-centric Privacy Management for
Protection - Concepts and Issues," Proc. International Conference Federated Identity Management," in Collaborative Computing:
on Availability, Reliability and Security (ARES 09.), Fukuoka, Networking, Applications and Worksharing (CollaborateCom
Japan, 2009 2007), pp. 187-195, New York, November 2007.
[4] Consumer fraud and Identity Theft complaint Data, Federal Trade [23] A. Jøsang, and S. Pope, "User centric identity management," In
Commission. http://www.ftc.gov/opa/2008/02/fraud.pdf, February Australian Computer Emergency Response Team Conference,
2008. Royal Pines Resort, Australia. 2005.
[5] D. Zhu, X. Li, and S. Wu, "Identity disclosure protection: A data [24] PKI, http://archive.opengroup.org/public/tech/security/pki
reconstruction approach for privacy-preserving data mining," J.
[25] Kerberos, http://web.mit.edu/kerberos/
Decision Support Systems, vol. 48, pp. 133-140, December 2009.
[26] CAS, http://www.jasig.org/cas
[6] K. Bai, Y. Liu, and P. Liu.,"Prevent Identity Disclosure in Social
Network Data Study," unpublished, 2009. [27] Federated identity, http://en.wikipedia.org/wiki/Federated_identity
[7] J.L.Wayman, "Biometrics in Identity Management Systems," [28] OASIS, http://www.oasis-open.org
Security & Privacy, IEEE, Vol 6, pp. 30-37, April 2008. [29] SAML, http://www.oasis-open.org/committees/tc_home.php?wg_a
[8] T.A. Johansen, I. Jrstad, and D.V. Thanh, "Identity management in b brev= security
mobile ubiquitous environments," Proc. 3rd International [30] WS-Federation,
Conference on Internet Monitoring and Protection (ICIMP 2008), http://www.ibm.com/developerworks/library/specification/ws-fed/
pp. 178-183, 2008. [31] Liberty Alliance, http://kantarainitiative.org/
[9] W. Tsui, "Digital Identity Management on the Internet," [32] Shibboleth, http://shibboleth.internet2.edu/
http://zoo.cs.yale.edu/classes/cs457/tsui_digital_identity_managem
ent.doc, unpublished, April 2006. [33] W. Hommel, and H. Reiser, "Federated Identity Management :
Shortcomings of existing standards," In 9th IFIP/IEEE
[10] A. Jøsang, M. AlZomai, and S. Suriadi, , "Usability and Privacy in International Symposium on Integrated Network Management,
Identity Management Architectures," In Australasian Information Nice, France. 2005.
Security Workshop: Privacy Enhancing Technologies, Ballarat,
Australia. 2007. [34] E. Bertino, F. Paci, and N. Shang, "Digital Identity Protection -
Concepts and Issues," In 4th International Conference on
[11] T. E. Maliki, J.Seigneur, "A Survey of User-centric Identity Availability, Reliability and Security, Fukuoka, Japan. 2009.
Management Technologies," In International Conference on
Emerging Security Information, Systems and Technologies, [35] S. Balasubramaniam, G.A. Lewis, E. Morris, S. Simanta, and D.B.
Valencia. 2007. Smith, "Identity Management and its Impact on Federation in a
System-of-Systems Context," Proc. IEEE International Systems
[12] K Cameron, "The Laws of Identity," http://ts- Conference, pp. 179-182, 2009.
si.org/files/TheLawsOfIdentity.pdf. 2005.
[36] A. Myllyniemi, "Identity Management Systems: A Comparison of
[13] E. Damiani, S.D. diVimercati, and P. Samarati, "Managing Current Solutions," TKK T-110.5290 Seminar on Network
multiple and dependable identities," Internet Computing, IEEE, vol Security, December, 2006.
7, pp. 29-37, December 2003.
[37] Windows Server domain,
[14] M. Dabrowski, and P. Pacyna, "Generic and complete three-level http://en.wikipedia.org/wiki/Windows_Server_domain
identity management model," In 2nd International Conference on
Emerging Security Information, Systems and Technologies, Cap [38] L. Bussard, D.E. Nitto, A. Nano, O. Nano, and G. Ripa, "An
Esterel. 2008. Approach to Identity Management for Service Centric Systems,"
Proc. 1st European Conference (ServiceWave 2008), Madrid,
[15] National E-Health Transition Authority, http://www.nehta.gov.au/ Spain, pp. 254-265, 2008.
[16] S.C. Lee,, "An Introduction to Identity Management," [39] OpenID, http://openid.net/
http://www.sans.org/reading_room/whitepapers/authentication/intr
oduction-identity-management_852. 2003. [40] D. Recordon, and D. Reed, "OpenID 2.0: a platform for user-
centric identity management," Conference on Computer and
[17] HP OpenView Identity Management solution Business blueprint, Communications Security, Proc. 2nd ACM workshop on Digital
http://h41087.www4.hp.com/solutions/entreprises/grandes_entrepr identity management , pp. 11-16, Alexandria, Virginia, USA, 2006.
ises/openview/pdf/im_bb.pdf
[41] H. Jo, H. Lee, K. Chun, and H. Park, "Interoperability and
[18] HP OpenView Identity Management Solution Whitepaper, Anonymity for ID Management Systems," 11th International
http://www.cbinews.com/uploadfile/whitepaper/2007-01- Conference on Advanced Communication Technology (ICACT
30/30160032.pdf 2009), pp. 1257-1260, 2009.
[19] J. Li, Chang, C.X. Shen, H. Zhen, Y.Z. He, and Y. Liu, "Survey of [42] SXIP, http://www.sxip.com/
research on identity management," Computer Engineering and
Design, vol 30, pp. 1365, 2009. [43] Higgins, http://www.eclipse.org/higgins/
[20] H. Koshutanski, M. Ion, and L. Telesca,, "Distributed Identity
Management Model for Digital Ecosystems," Proc. The



You might also like