A Survey on Identity Management Protocols and Standards

Teruko MIYATA
Yuzo KOGA
Paul MADSEN
Shin-ichi ADACHI
Yoshitsugu TSUCHIYA
Yasuhisa SAKAMOTO
Kenji TAKAHASHI

Publication
IEICE TRANSACTIONS on Information and Systems   Vol.E89-D    No.1    pp.112-123
Publication Date: 2006/01/01
Online ISSN: 1745-1361
DOI: 10.1093/ietisy/e89-d.1.112
Print ISSN: 0916-8532
Type of Manuscript: INVITED SURVEY PAPER
Category: 
Keyword: 
identity,  federation,  pseudonym,  security,  privacy,  authentication,  

Full Text: PDF(1.6MB)>>
Buy this Article



Summary: 
This paper provides an overview of identity management with emphasis on the federated approaches, covering related standard specifications, and security and privacy considerations. Actual business cases, ranging from B2E to B2C in different industries, such as mobile communications, gaming, and digital TV are introduced. The Liberty Alliance identity frameworks are used as a concrete example to illustrate federated identity management technologies. Moreover, other approaches, such as SAML, shibboleth and WS-Federation, are compared.


open access publishing via