期刊文献+

Overview of Identity Management 被引量:2

Overview of Identity Management
下载PDF
导出
摘要 In recent years there has been a fast grow of various electronic services.Each service requires specif-ic credentials for authenticating and authorizing user ac-cess or specific subset of user's personal information for transactions the service offers.Such a situation causes problems with remembering multiple,service-specific authentication data,with controlling user's personal data spread across different services-problems with managing user's identities.This paper is an overview on Identity Management(IdM).It introduces basic terms connected with IdM,shows current and emerging appli-cation areas,enumerates the most important IdM activi-ties,describes the most representative identity manage-ment specifications and frameworks and at the end,it points out important problems in identity management which need to be addressed in the near future. In recent years there has been a fast grow of various electronic services.Each service requires specif-ic credentials for authenticating and authorizing user ac-cess or specific subset of user's personal information for transactions the service offers.Such a situation causes problems with remembering multiple,service-specific authentication data,with controlling user's personal data spread across different services-problems with managing user's identities.This paper is an overview on Identity Management(IdM).It introduces basic terms connected with IdM,shows current and emerging appli-cation areas,enumerates the most important IdM activi-ties,describes the most representative identity manage-ment specifications and frameworks and at the end,it points out important problems in identity management which need to be addressed in the near future.
出处 《China Communications》 SCIE CSCD 2008年第4期129-142,共14页 中国通信(英文版)
关键词 IDENTITY Digital IDENTITY CONTEXTUAL iden-tity IDENTITY management IDENTITY FEDERATION Circle of TRUST Identity Digital identity Contextual iden-tity Identity management Identity federation Circle of trust
  • 相关文献

参考文献22

  • 1Tom Scavo,Scott Cantor.“Shibboleth Architecture.Technical Overview”. .
  • 2Joaquin Miller.“Yadis Specification”,version 1.0. www.yadis.org .
  • 3Rick Kuhn,Susan Landau,Ramaswamy Chandramouli.User-Centric Identity Management. IEEE Security and Privacy . 2007
  • 4TMiyata,,Y.Koga,,P.Madesen,,S.Adachi,,Y.Tsuchiya,,Y.Sakamoto,,K.Takahashi.A survey on Identity Management Protocols and Standards. IEICE Transactions on Information and Systems . 2006
  • 5Phil Windley.Digital Identity. . 2005
  • 6Digital Identity Management.A Critical Link to Service Suc- cess. .
  • 7Liberty ID-WSD Service - federated social identity. .
  • 8Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. .
  • 9“Extensible Resource Identifier (XRI) Syntax V2.0”. OASIS specification .
  • 10“Extensible Resource Identifi er (XRI) Resolution V2.0". OASIS Specifi cation .

同被引文献29

引证文献2

二级引证文献6

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部