Skip to main content
Top

2014 | OriginalPaper | Chapter

3. Digital Identity Management

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this chapter, we present a literature review on the definitions of Digital Identity Management (DigIdM), various origins of identity silos, and digital identity management technical models. We provide also a comparison between digital identity management technical models and then we explain the basics of a new technical approach that is based on global Web digital identity management. We highlight the contributions of user-centric digital identity management. Finally, we explain a metadata-based approach to make digital identity less visible in order to give users more control on persistent digital identity.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference P.J. Windley, Digital identity: Unmasking identity management architecture (IMA). O’Reilly Media (2005) P.J. Windley, Digital identity: Unmasking identity management architecture (IMA). O’Reilly Media (2005)
2.
5.
go back to reference S. Vanamali, Identity management framework. Inf. Syst. Control J. 4 (2004) S. Vanamali, Identity management framework. Inf. Syst. Control J. 4 (2004)
6.
go back to reference D.G.W. Birch, The identity vision, in Digital Identity Management: Perspectives on the Technological, Business and Social Implications, ed. by D.G.W. Birch (Gower Publishing Limited, 2007), pp. 3–8 D.G.W. Birch, The identity vision, in Digital Identity Management: Perspectives on the Technological, Business and Social Implications, ed. by D.G.W. Birch (Gower Publishing Limited, 2007), pp. 3–8
7.
go back to reference M. Benantar, Access Control Systems: Security, Identity Management and Trust Models (Springer Science + Business Media, 2006) M. Benantar, Access Control Systems: Security, Identity Management and Trust Models (Springer Science + Business Media, 2006)
8.
go back to reference G. Ben Ayed, Consolidating fragmented identity: Attributes aggregation to secure information systems. IADIS Int. J. Comput. Sci. Inf. Syst. 4, 1–12 (2009) G. Ben Ayed, Consolidating fragmented identity: Attributes aggregation to secure information systems. IADIS Int. J. Comput. Sci. Inf. Syst. 4, 1–12 (2009)
10.
go back to reference W. Hommel, Using XACML for privacy control in SAML-based identity federations, in 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria (2005), pp. 160–169 W. Hommel, Using XACML for privacy control in SAML-based identity federations, in 9th IFIP TC-6 TC-11 Conference on Communications and Multimedia Security, Salzburg, Austria (2005), pp. 160–169
12.
go back to reference A. Scorer, Identity directories and databases, in Digital Identity Management: Perspectives on the Technological, Business and Social Implications, ed. by D.G.W. Birch (Gower Publishing Limited, 2007), pp. 41–49 A. Scorer, Identity directories and databases, in Digital Identity Management: Perspectives on the Technological, Business and Social Implications, ed. by D.G.W. Birch (Gower Publishing Limited, 2007), pp. 41–49
14.
go back to reference International Telecommunication Union—Focus Group on Identity Management (FG IdM), Report on identity management ecosystem and Lexion (2007) International Telecommunication Union—Focus Group on Identity Management (FG IdM), Report on identity management ecosystem and Lexion (2007)
15.
go back to reference E. Damiani et al., Managing multiple and dependable identities. IEEE Internet Comput. IEEE Comput. Soc. 29–37 (2003) E. Damiani et al., Managing multiple and dependable identities. IEEE Internet Comput. IEEE Comput. Soc. 29–37 (2003)
16.
go back to reference D.A. Buell, R. Sandhu, Identity management. IEEE Internet Comput. 26–28 (2003) D.A. Buell, R. Sandhu, Identity management. IEEE Internet Comput. 26–28 (2003)
17.
go back to reference M. Small, Business and technical motivation for identity management. Inf Secure Tech R 9, 6–21 (2004)CrossRef M. Small, Business and technical motivation for identity management. Inf Secure Tech R 9, 6–21 (2004)CrossRef
18.
go back to reference R.R. Panko, Corporate Computer and Network Security, 2nd edn. (Prentice Hall, New Jersey, 2009) R.R. Panko, Corporate Computer and Network Security, 2nd edn. (Prentice Hall, New Jersey, 2009)
21.
go back to reference M. Hansen, User-controlled identity management: The key to the future of privacy? Int. J. Intellect. Property Manag. 2, 325–344 (2008) M. Hansen, User-controlled identity management: The key to the future of privacy? Int. J. Intellect. Property Manag. 2, 325–344 (2008)
22.
go back to reference J. Crosby, Challenges and opportunities in identity assurance (2008) J. Crosby, Challenges and opportunities in identity assurance (2008)
38.
go back to reference International Telecommunication Union—Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis (2008) International Telecommunication Union—Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis (2008)
39.
go back to reference R. Oppliger, Microsoft.NET passport and identity management. Inf. Secur. Tech. Rep. 9, 26–34 (2004)CrossRef R. Oppliger, Microsoft.NET passport and identity management. Inf. Secur. Tech. Rep. 9, 26–34 (2004)CrossRef
40.
go back to reference K.-K.R. Choo, Issue report on business adoption of microsoft passport. Inf. Manag. Comput. Secur. 14, 218–234 (2006)CrossRef K.-K.R. Choo, Issue report on business adoption of microsoft passport. Inf. Manag. Comput. Secur. 14, 218–234 (2006)CrossRef
42.
go back to reference J. Hodges et al., Glossary for the OASIS security assertion markup language (SAML) V2.0, OASIS (2005) J. Hodges et al., Glossary for the OASIS security assertion markup language (SAML) V2.0, OASIS (2005)
43.
go back to reference J. Hodges, Liberty technical glossary, Liberty Alliance Project (2006) J. Hodges, Liberty technical glossary, Liberty Alliance Project (2006)
45.
go back to reference B. Pfitzmann, Federated identity-management protocols (Transcript of Discussion). LNCS J. (Springer, 2005), pp. 175–177 B. Pfitzmann, Federated identity-management protocols (Transcript of Discussion). LNCS J. (Springer, 2005), pp. 175–177
46.
go back to reference N. Klingenstein, Attribute aggregation and federated identity, in Proceedings of the IEEE International Symposium on Applications and the Internet Workshops (2007) N. Klingenstein, Attribute aggregation and federated identity, in Proceedings of the IEEE International Symposium on Applications and the Internet Workshops (2007)
47.
go back to reference Q. Pham et al., Consistency of user attribute in federated systems. LNCS J. (Springer, 2007) Q. Pham et al., Consistency of user attribute in federated systems. LNCS J. (Springer, 2007)
48.
go back to reference OASIS, XRI requirements and glossary (2003) OASIS, XRI requirements and glossary (2003)
49.
go back to reference OASIS, Extensible resource identifier (XRI) resolution (2006) OASIS, Extensible resource identifier (XRI) resolution (2006)
50.
go back to reference OASIS, An introduction to XRIs (Working Draft) (2005) OASIS, An introduction to XRIs (Working Draft) (2005)
52.
go back to reference D. Reed et al., The social web: Creating an open social network with XDI. PlanetWork J. (2004) D. Reed et al., The social web: Creating an open social network with XDI. PlanetWork J. (2004)
53.
go back to reference P. Hoschka, CSCW research at GMD-FIT: From basic groupware to the social Web. ACM SIGGROUP Bull. 19, 5–9 (1998)CrossRef P. Hoschka, CSCW research at GMD-FIT: From basic groupware to the social Web. ACM SIGGROUP Bull. 19, 5–9 (1998)CrossRef
54.
go back to reference A.C. Krey, History and the social Web (University of Minnesota Press, 1995) A.C. Krey, History and the social Web (University of Minnesota Press, 1995)
55.
go back to reference J. Caroll, J. Murphy, Who am I? I am Me! identity management in a networked world, in Proceedings of the 4th International We-B Conference (2003) J. Caroll, J. Murphy, Who am I? I am Me! identity management in a networked world, in Proceedings of the 4th International We-B Conference (2003)
57.
go back to reference R. Abhyankar et al., (2008) Improving online security. Sci. Am. Mag. 96–99 R. Abhyankar et al., (2008) Improving online security. Sci. Am. Mag. 96–99
60.
go back to reference V. Mayer-Schönberger, Delete: The virtue of forgetting in the digital age (Princeton University Press, 2009) V. Mayer-Schönberger, Delete: The virtue of forgetting in the digital age (Princeton University Press, 2009)
62.
go back to reference G. Bell, J. Gemmel, A digital life. Sci. Am. Mag. 58–65 (2007) G. Bell, J. Gemmel, A digital life. Sci. Am. Mag. 58–65 (2007)
63.
go back to reference K. Cukier, A special report on managing information. The Economist (23 Feb–5 March 2010) K. Cukier, A special report on managing information. The Economist (23 Feb–5 March 2010)
65.
go back to reference M. Fischetti, Scoring your identity: New tactics root out the false use of personal data. Sci. Am. 27–28 (2007) M. Fischetti, Scoring your identity: New tactics root out the false use of personal data. Sci. Am. 27–28 (2007)
67.
go back to reference P. Brown, Privacy in an Age of Terabytes and Terror. Sci. Am. Mag. 46–47 (2008) P. Brown, Privacy in an Age of Terabytes and Terror. Sci. Am. Mag. 46–47 (2008)
68.
go back to reference A.R. Galloway, E. Thacker, The exploit—A theory of networks (University of Minnesota Press, 2008) A.R. Galloway, E. Thacker, The exploit—A theory of networks (University of Minnesota Press, 2008)
69.
go back to reference S.L. Garfinkel, Information of the World, UNITE! Sci. Am. Mag. 82–87 (2008) S.L. Garfinkel, Information of the World, UNITE! Sci. Am. Mag. 82–87 (2008)
73.
go back to reference G. Ben Ayed, Digital identity metadata scheme: A technical approach to reduce digital identity risks, in International Workshop on Information Security and Risk Management of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA-2011), Biopolis, Singapore (2011) G. Ben Ayed, Digital identity metadata scheme: A technical approach to reduce digital identity risks, in International Workshop on Information Security and Risk Management of the 25th IEEE International Conference on Advanced Information Networking and Applications (AINA-2011), Biopolis, Singapore (2011)
74.
go back to reference G. Ben Ayed, S. Ghernaouti-Hélie, XRD digital identity metadata-based approach to foster collaborations across networked computing ecosystems, in The Third International Conference on Networked Digital Technologies (NDT 2011), Macau, China (2011) G. Ben Ayed, S. Ghernaouti-Hélie, XRD digital identity metadata-based approach to foster collaborations across networked computing ecosystems, in The Third International Conference on Networked Digital Technologies (NDT 2011), Macau, China (2011)
75.
go back to reference G. Ben Ayed et al., Towards building weak links between persistent digital identity documents: MetaEngine and distance to make identity less visible, in International Conference on Digital Enterprise and Information Systems (DEIS2011), London, UK (2011) G. Ben Ayed et al., Towards building weak links between persistent digital identity documents: MetaEngine and distance to make identity less visible, in International Conference on Digital Enterprise and Information Systems (DEIS2011), London, UK (2011)
78.
go back to reference A. Elabidi et al., Towards hiding federated digital identity: Stop-dissemination mechanism in content-centric networking, in The 4th International Conference on Security of Information and Networks (SIN 2011), Sydney, Australia (2011) A. Elabidi et al., Towards hiding federated digital identity: Stop-dissemination mechanism in content-centric networking, in The 4th International Conference on Security of Information and Networks (SIN 2011), Sydney, Australia (2011)
79.
go back to reference D. Meyer et al., Report from the IAB Workshop on Routing and Addressing (RFC 4984) (2007) D. Meyer et al., Report from the IAB Workshop on Routing and Addressing (RFC 4984) (2007)
80.
go back to reference D. Clark et al., Addressing reality: An architectural response to real world demands on the evolving internet, in ACM SIGCOMM Conference—Workshop on future directions in network architecture (FDNA-03), Germany (2003) D. Clark et al., Addressing reality: An architectural response to real world demands on the evolving internet, in ACM SIGCOMM Conference—Workshop on future directions in network architecture (FDNA-03), Germany (2003)
81.
go back to reference M. Handley, A. Greenhalgh, Steps towards a Dos-Resistant internet architecture, in ACM SIGCOMM Conference—Workshop on future directions in network architecture (FDNA-03), USA (2004) M. Handley, A. Greenhalgh, Steps towards a Dos-Resistant internet architecture, in ACM SIGCOMM Conference—Workshop on future directions in network architecture (FDNA-03), USA (2004)
82.
go back to reference V. Jacobson, If a Clean Slate is the solution what was the problem, in Stanford Clean Slate Seminar (2006) V. Jacobson, If a Clean Slate is the solution what was the problem, in Stanford Clean Slate Seminar (2006)
83.
go back to reference V. Jacobson et al., Networking named content, in The 5th International Conference on Emerging Networking Experiments and Technologies (ACM CoNEXT ‘09), pp. 1–12 (2009) V. Jacobson et al., Networking named content, in The 5th International Conference on Emerging Networking Experiments and Technologies (ACM CoNEXT ‘09), pp. 1–12 (2009)
Metadata
Title
Digital Identity Management
Author
Ghazi Ben Ayed
Copyright Year
2014
DOI
https://doi.org/10.1007/978-3-319-08231-8_3