A USER-CENTRIC APPROACH FOR FEDERATED IDENTITY MANAGEMENT

被引:0
作者
Bergadano, Francesco [1 ]
Accornero, Renato [1 ]
Lucisano, Giovanna [1 ]
Rispoli, Daniele [1 ]
机构
[1] Univ Turin, Dipartimento Informat, Turin, Italy
来源
INTERNATIONAL JOURNAL ON INFORMATION TECHNOLOGIES AND SECURITY | 2013年 / 5卷 / 01期
关键词
Federated Identity Management; Personal Authentication Device; Privacy;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Modern Identity Management systems improve their users' data security and authentication experience considerably. Conversely, given their centralized nature, these systems are often under attack, be it external or internal, because of the important and very likely reserved information they host on their users' behalf. A way to solve this pressing issue is to move the data back in its owner's hands while maintaining all the nice usability improvements of such a system. Using what can be called "User Centric Identity Management" allows just that: every user holds his own data on a device that stores it securely and acts as an arbiter between this information and the services that request it, granting its owner a much more fine tuned control over his information.
引用
收藏
页码:3 / 18
页数:16
相关论文
共 21 条
[1]   User centricity: A taxonomy and open issues [J].
Bhargav-Spantzel, Abhilasha ;
Camenisch, Jan ;
Gross, Thomas ;
Sommer, Dieter .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (05) :493-527
[2]   User-centric identity management - New trends in standardization and regulation [J].
Bramhall, Pete ;
Hansen, Marit ;
Rannenberg, Kai ;
Roessler, Thomas .
IEEE SECURITY & PRIVACY, 2007, 5 (04) :84-87
[3]  
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[4]  
Camenisch J., 2002, CCS 02 P 9 ACM C COM, P21, DOI [10.1145/586110.586114, DOI 10.1145/586110.586114]
[5]  
Cameron K., 2005, LAWS IDENTITY
[6]  
Chadwick DW, 2009, LECT NOTES COMPUT SC, V5705, P96, DOI 10.1007/978-3-642-03829-7_3
[7]  
Dorflinger T, 2010, SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P155
[8]  
Enck W., 2011, ENCY CRYPTOGRAPHY SE, P34
[9]   Understanding Android Security [J].
Enck, William ;
Ongtang, Machigair ;
McDaniel, Patrick .
IEEE SECURITY & PRIVACY, 2009, 7 (01) :50-57
[10]  
Josang A., 2007, ACSW 07, V68, P143