A Survey of User-centric Identity Management Technologies

  title={A Survey of User-centric Identity Management Technologies},
  author={Tewfiq El Maliki and Jean-Marc Seigneur},
  journal={The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)},
  • Tewfiq El Maliki, J. Seigneur
  • Published 14 October 2007
  • Computer Science
  • The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007)
Computing anytime anywhere is more and more the rule. In this ambient intelligent world, the choice of identity mechanisms will have a large impact on its social, cultural, business and political aspects. Privacy is a human need and the whole of society would suffer from its demise. Moreover, people have a hectic life and cannot spend their time administering their digital identities. In this paper, we survey how the requirements for identity management have evolved, and their associated… 

Tables from this paper

Towards a User-Centric Identity-Usage Monitoring System
  • D. Mashima, M. Ahamad
  • Computer Science
    2008 The Third International Conference on Internet Monitoring and Protection
  • 2008
The requirements for a user-centric identity-usage monitoring system to solve such problems are identified and a monitoring system that runs on a trusted third party is proposed that can transparently use context information of a request to detect anomalous use of online identity.
A survey of Identity Management technology
  • Yuan Cao, Lin Yang
  • Business
    2010 IEEE International Conference on Information Theory and Information Security
  • 2010
A survey of identity management from the perspectives of development stages and functions variety of Identity Management, which gives a rough classification of current systems to the corresponding paradigms and models.
A Survey on Identity Management for the Future Network
This survey presents the state of the art of Identity Management systems for the Future Network, highlighting the existing architectures, specific devices applied, challenges and future perspectives.
Federated Identity Management Systems: A Privacy-Based Characterization
The authors analyze existing systems and describe a privacy-driven taxonomy of design choices, which can help technical experts consulting on public policy relating to identity management.
Identity Management Systems: Models, Standards, and COTS Offerings
The chapter helps in establishing an understanding of frameworks that IdM systems follow while helping the reader contrast between different IdM architecture models.
A Privacy-Considerate Framework for Identity Management in Mobile Services
A framework for identity management in mobile services that empowers users to govern the use and release of their personal information and provides an effective, privacy-considerate delivery of services over the mobile Web environment is described.
Analysis of a Decentralised Digital Token Architecture for Public Transport
This work aims to motivate the need and establish the feasibility for the application of a privacy-enhancing digital token management service to public transit and demonstrates that the demonstrated throughput and latency shows that the system can feasibly compete with solutions currently in use.
Identity Management Architecture: Paradigms and Models
This paper provides an overview of identity management architecture from the viewpoint of paradigms and models and shows how components varying and functions changing to isolated model, centralized model, and federated model.
Architectures for identity management
  • M. I. Chehab, A. Abdallah
  • Computer Science
    2009 International Conference for Internet Technology and Secured Transactions, (ICITST)
  • 2009
A sample of two abstract, concise and generic architectures upon which some of the emerging IDM systems are based are presented, providing the foundation for future investigation and analysis of security risks emerging from the trust relationships inherent in each of these architectures.
Modeling Identity for the Internet of Things: Survey, Classification and Trends
This study outlines the foundations for building a formal model of IoT identity based on attributes and shows that it is feasible to incorporate such an identity model to achieve both fine-grained and flexible system design in large-scale IoT systems.


Usability and Privacy in Identity Management Architectures
A user-centric approach based on hardware and software technology on the user-side with the aim of assisting users when accessing online services is proposed.
OpenID 2.0: a platform for user-centric identity management
The OpenID framework is emerging as a viable solution for Internet-scale user-centric identity infrastructure that supports both URLs and XRIs as user identifiers, uses Yadis XRDS documents for identity service discovery, adds stronger security, and supports both public and private identifiers.
User Centric Identity Management
This paper takes a new look at identity management, and proposes solutions that are designed to be cost effective and scalabl e from the users’ perspective, while at the same time being compatible with traditional identity manag ement systems.
A Survey on Identity Management Protocols and Standards
This paper provides an overview of identity management with emphasis on the federated approaches, covering related standard specifications, and security and privacy considerations. Actual business
User centricity: a taxonomy and open issues
This work investigates the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both pre-dominant classes and explores the feasibility of reaching beyonduser-centricity.
The Laws of Identity
The approach has been to develop a formal understanding of the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity, which define a unifying identity metasystem that can offer the Internet the identity layer it so obviously requires.
Mobile Identity Management: An Enacted View
A view of identit y in mobile business is introduced based on three principles and it is found that this approach is useful in explaining some recent research findings in ubiquitous retailing.
Trust, Security and Privacy in Global Computing
This thesis sets up a framework, called entification, which encompasses both computational trust and identity aspects, and whose goal is to be applicable to global computing, and draws another parallel with human social networks, namely the notion of entity recognition (ER).
DIX: Digital Identity Exchange Protocol
This document specifies a binding and two profiles of the Security Assertion Markup Language (SAML) for identity information message exchanges, a discovery protocol based on HTML/HTTP, a message signing mechanism based on HMAC, and a signature verification protocol based upon HTML/ HTTP.
Independent Center for Privacy Protection (ICPP) and Studio Notarile Genghini (SNG) Identity Management Systems (IMS): Identification and Comparison Study
  • Independent Center for Privacy Protection (ICPP) and Studio Notarile Genghini (SNG) Identity Management Systems (IMS): Identification and Comparison Study
  • 2003