skip to main content
10.1145/1456424.1456438acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Cross-identifier domain discovery service for unrelated user identities

Published:31 October 2008Publication History

ABSTRACT

Interoperable Identity Management systems are prerequisite for novel user-centric services, which strongly rely on user identity attributes and security services. Future Identity Management systems have to include a discovery framework which will enable dynamic and automatic exchange of user identity attributes between services from different key-business areas, e.g. Internet, healthcare, e-government, e-banking, entertainment, etc. The framework should allow federating different user identities so that any of them would be sufficient to bootstrap trust relation between the user and any service. The first and fundamental step to achieve the two goals is the discovery of multiple user identities, usually unrelated to each other and hosted by a distributed environment of independent identifier domains. Current discovery mechanisms are intra-identifier domain oriented, i.e. they focus on discovering identity- and identity-based services for a given identity described by known identifier valid inside certain identifier domain. This paper proposes a discovery mechanism which overcomes this constraint and allows for inter-identifier domain (inter-federation) discovery of user identities. To the best of our knowledge, it is the first proposition that crosses the border of an identifier domain (and federation) and allows for discovery of completely unrelated identities of the user.

References

  1. R. Radhakrishnan, "Identity & Security. A Common Architecture & Framework for SOA and Network Convergence", Futuretext, 2007 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Liberty Alliance Project, "Liberty ID-WSF Discovery Service SpecificationGoogle ScholarGoogle Scholar
  3. Focus Group on Identity Management, "Report on Identity Management Use Cases and Gap Analysis", ITU-T, 2007Google ScholarGoogle Scholar
  4. P. Windley: "Digital Identity ", O'Reilly, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. L. Jean Camp: Digital Identity, IEEE Technology and Society Magazine, Fall 2004Google ScholarGoogle ScholarCross RefCross Ref
  6. D.V. Thanh, I. Jorstadt, "The Ambiguity of Identity", Teletronikk, Vol.3, 2007Google ScholarGoogle Scholar
  7. Audun Jøsang, John Fabre, Brian Hay, James Dalziel , Simon Pope1, "Trust Requirements in Identity Management", Proceedings of the 2005 Australasian workshop on Grid computing and e-research -- Volume 44, 2005 Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Dabrowski, P. Pacyna, "Generic and complete, three-level Identity Management Model", accepted for publication and presentation at The Second International Conference on Emerging Security Information, Systems and Technologies (SECURWARE 2008), August 25--31, 2008 -- Cap Esterel, France Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Anonymous -- P2P.org, http://www.anonymous-p2p.org/Google ScholarGoogle Scholar
  10. Yadis Specification 1.0Google ScholarGoogle Scholar
  11. XRI 2.0 ResolutionGoogle ScholarGoogle Scholar
  12. Shibboleth Architecture -- Technical OverviewGoogle ScholarGoogle Scholar
  13. Liberty Alliance Project, "Access to Identity-Enabled Web Services in Cross-Border, Inter-Federation ScenariosGoogle ScholarGoogle Scholar

Index Terms

  1. Cross-identifier domain discovery service for unrelated user identities

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      DIM '08: Proceedings of the 4th ACM workshop on Digital identity management
      October 2008
      112 pages
      ISBN:9781605582948
      DOI:10.1145/1456424

      Copyright © 2008 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 31 October 2008

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate16of34submissions,47%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader