An Examination of Identity Management Models in an Internet Setting

An Examination of Identity Management Models in an Internet Setting

Kenneth J. Giuliani, V. Kumar Murty
ISBN13: 9781609601232|ISBN10: 1609601238|EISBN13: 9781609601256
DOI: 10.4018/978-1-60960-123-2.ch008
Cite Chapter Cite Chapter

MLA

Giuliani, Kenneth J., and V. Kumar Murty. "An Examination of Identity Management Models in an Internet Setting." Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, et al., IGI Global, 2011, pp. 106-114. https://doi.org/10.4018/978-1-60960-123-2.ch008

APA

Giuliani, K. J. & Murty, V. K. (2011). An Examination of Identity Management Models in an Internet Setting. In R. Santanam, M. Sethumadhavan, & M. Virendra (Eds.), Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives (pp. 106-114). IGI Global. https://doi.org/10.4018/978-1-60960-123-2.ch008

Chicago

Giuliani, Kenneth J., and V. Kumar Murty. "An Examination of Identity Management Models in an Internet Setting." In Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives, edited by Raghu Santanam, M. Sethumadhavan, and Mohit Virendra, 106-114. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-60960-123-2.ch008

Export Reference

Mendeley
Favorite

Abstract

The purpose of this chapter is to examine the strengths and weaknesses of the most commonly used model for digital identities. It is compared to other models which have preceded it, thus giving a background on its development. The models are measured against a set of criteria which it is desirable for an identity management system to have. The underlying hope is that understanding this model will help improve it or even lead to a different model.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.