Identity Management Architecture: Paradigms and Models

Article Preview

Abstract:

This paper provides an overview of identity management architecture from the viewpoint of paradigms and models. The definition of identity management architecture has been discussed, paradigms are classified by the development stage and core design principle transmission of the architecture which include network centric paradigm, service centric paradigm, and user centric paradigm; models are grouped by components varying and functions changing to isolated model, centralized model, and federated model. These paradigms and models have no collisions among them for they are views of identity management from different viewpoint.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

647-651

Citation:

Online since:

November 2010

Export:

Price:

[1] Jøsang, A., AlZomai, M., and Suriadi, S.: Usability and Privacy in Identity Management Architectures. In Australasian Information Security Workshop: Privacy Enhancing Technologies, Ballarat, Australia (2007).

Google Scholar

[2] Tewfiq El Maliki, J.S.: A Survey of User-centric Identity Management Technologies. In International Conference on Emerging Security Information, Systems and Technologies, Valencia (2007).

DOI: 10.1109/secureware.2007.4385303

Google Scholar

[3] Kim C.: The Laws of Identity, http: /ts-si. org/files/TheLawsOfIdentity. pdf (2005).

Google Scholar

[4] Dabrowski, M., and Pacyna, P.: Generic and complete three-level identity management model. In 2nd International Conference on Emerging Security Information, Systems and Technologies, Cap Esterel (2008).

DOI: 10.1109/securware.2008.18

Google Scholar

[5] National E-Health Transition Authority, http: /www. nehta. gov. au.

Google Scholar

[6] Lee, S.C.: An Introduction to Identity Management, SANS Institute InfoSec Reading Room.

Google Scholar

[7] Windley, P.: Digital Identity. O'Reilly Media, Inc (2005).

Google Scholar

[8] S. Claub, M.K.: Identity management and its support of multilateral security, J. Computer Networks: The International Journal of Computer and Telecommunications Networking, 37, pp.205-219 (2001).

DOI: 10.1016/s1389-1286(01)00217-1

Google Scholar

[9] Hansen, M., Berlich, P., Camenisch, J., Claub, S., Pfitzmann, A., and Waidner, M.: Privacy-enhancing identity management, Information Security Technical Report, 9, pp.35-44 (2004).

DOI: 10.1016/s1363-4127(04)00014-7

Google Scholar

[10] Koch, M., Worndl, W.: Community Support and Identity Management. In 7th European Conference on Computer-Supported Cooperative Work, Bonn, Germany (2001).

Google Scholar

[11] White, P.: Identity Management Architecture: A New Direction. In8th IEEE International Conference on Computer and Information Technology, Sydney, (2008).

Google Scholar

[12] Jøsang, A., and Pope, S.: User centric identity management. In Australian Computer Emergency Response Team Conference, Royal Pines Resort, Australia (2005).

Google Scholar

[13] Hommel, W., Reiser, H.: Federated Identity Management: Shortcomings of existing standards. In 9th IFIP/IEEE International Symposium on Integrated Network Management – Managing New Networked Worlds, Nice, France (2005).

Google Scholar