Skip to main content

A New User-Centric Identity Management Infrastructure for Federated Systems

  • Conference paper
Trust and Privacy in Digital Business (TrustBus 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 4083))

Abstract

In today’s Information Systems, users present credentials with local significance, to be authenticated and gain access to internal functionality. Users have different login-password combinations for each online service, or even different credentials for different roles within a service. As a result they tend to make poor password choices that are easy to remember, or even repeat the same login-password information on different services. This poses security threats to service providers and a privacy risk for end-users. The solution is to shift to identity management systems. Such a system will issue a digital identity for every user and will be able to control the full life-cycle of these identities, from creation to termination. Another aspect of such a system is the single sign-on mechanism, whereby a single action of user authentication and authorization can permit the user to access multiple services. The benefits are improved security, accountability and privacy protection.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bajaj, S., et al.: Web Services Federation Language (WS-Federation). IBM Corporation et al., Specification Document (July 2003)

    Google Scholar 

  2. Hodges, J., Wason, T.: Liberty Architecture Overview. Liberty Alliance, White Paper (January 2003)

    Google Scholar 

  3. Brown, K.: Security Briefs: Step-by-Step Guide to InfoCard, http://msdn.microsoft.com//msdnmag/issues/06/05/securitybriefs/default.aspx

  4. idemix, http://www.zurich.ibm.com/security/idemix/

  5. Windley, P.: Digital Identity. O’Reilly, Sebastopol,California (2005)

    Google Scholar 

  6. Gladman, B., Ellison, C., Bohm, N.: Digital Signatures, Certificates and Electronic Commerce (April 1999)

    Google Scholar 

  7. Pfitzmann, B., Waidner, M.: Anonymity, Unobservability, Pseudonymity, and Identity Management - A proposal for terminology. Tu Dresden, Department of Computer Science Technical report (2004)

    Google Scholar 

  8. Buell, A.D., Sandhu, R.: Identity Management. IEEE Internet Computing, 26–28 (November 2003)

    Google Scholar 

  9. Hansen, M., Berlich, P., Camenisch, J., Claub, S., Pfitzmann, B., Waidner, M.: Privacy-Enhancing Identity Management. Information Security, vol. 9.1, pp. 35–44. Elsevier Science Press, Amsterdam (2004)

    Google Scholar 

  10. Marsh, S.: Identity and Authentication in the E-economy. In: Information Security, vol. 7.3, pp. 12–19. Elsevier Science Press, Amsterdam (2003)

    Google Scholar 

  11. Damiani, E., Vimercati, S., Samarati, P.: Managing Multiple and Dependable Identities. IEEE Internet Computing, 29–36 (December 2003)

    Google Scholar 

  12. Poursalidis, V.: Identity Management Infrastructure for the Digital World, Master’s Thesis, University of Crete (2005)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Poursalidis, V., Nikolaou, C. (2006). A New User-Centric Identity Management Infrastructure for Federated Systems. In: Fischer-Hübner, S., Furnell, S., Lambrinoudakis, C. (eds) Trust and Privacy in Digital Business. TrustBus 2006. Lecture Notes in Computer Science, vol 4083. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11824633_2

Download citation

  • DOI: https://doi.org/10.1007/11824633_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-37750-4

  • Online ISBN: 978-3-540-37752-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics