Corpus ID: 17924114

The Identity Metasystem : A User-Centric , Inclusive Web Authentication Solution

@inproceedings{Jones2006TheIM,
  title={The Identity Metasystem : A User-Centric , Inclusive Web Authentication Solution},
  author={Michael B. Jones},
  year={2006}
}
1. The Web’s Problems are often Identity Problems Many of the problems facing the Web today stem from the lack of a widely deployed, easily understood, secure identity solution. Microsoft’s “InfoCard” project and the Identity Metasystem vision underlying it are aimed at filling this gap using technology that all can adopt and with solutions that all can endorse, putting users in control of their identity interactions on the Web. A comparison between the brick-and-mortar world and the online… Expand
Secure roaming with identity metasystems
TLDR
This paper argues that in order to support different types of roaming, the identity metasystem client should be structured as a set of distributable components and describes such distributed client-side software architecture and how that architecture is implemented by adapting Novell's Bandit project. Expand
Enabling User Control with Personal Identity Management
TLDR
This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities. Expand
Privacy-Enhanced User-Centric Identity Management
TLDR
This paper proposes a category-based privacy preference approach to enhance the privacy of user-centric identity management systems and presents a proof-of-concept prototype of the approach in the Identity Metasystem. Expand
Evaluation Criteria for Future Identity Management
  • Jesse Leskinen
  • Computer Science
  • 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications
  • 2012
TLDR
New design and evaluation criteria for future identity management system designs are proposed by first reviewing criteria presented in current literature and then proceeding to combine these to create a more comprehensive set of requirements. Expand
A Security Meta-model for Service-Oriented Architectures
TLDR
The International Conference on Services Computing 2009 will help in bridging the gap between business services and information technology by driving research in technologies such as service-oriented architecture (SOA), business process integration and management, service engineering and grid/utility computing and Web 2.0. Expand
Engineering Semantic-Based Interactive Multi-device Web Applications
TLDR
This paper presents the experience with SenSee to demonstrate general engineering lessons for this type of applications, and particularly looks at utilizing the techniques of Web Services, Web 2.0 and the Semantic Web to solve the problems of content reuse and integration. Expand
Mejora de sistemas de gestión de identidades centrados en el usuario mediante modelos de reputación en entornos distribuidos= Enhancing user-centric identity management systems with reputation models in distributed environments
TLDR
Conclusions and Future Work are concluded and conclusions are drawn about the aims and methods used to achieve these goals. Expand

References

SHOWING 1-10 OF 11 REFERENCES
Authentication in an Internet Banking Environment; Towards Developing a Strategy for Fraud Detection
  • K. Bignell
  • Computer Science, Business
  • International Conference on Internet Surveillance and Protection (ICISP’06)
  • 2006
TLDR
This paper outlines a framework for Internet banking security using multi-layered, feed-forward artificial neural networks that have the potential to significantly limit present levels of financial fraud in comparison to existing fraud 'prevention' techniques. Expand
WinFX Developer Center
  • January
  • 2006
FFIEC 05] Federal Financial Institutions Examination Council Authentication in an Internet Banking Environment
  • FFIEC 05] Federal Financial Institutions Examination Council Authentication in an Internet Banking Environment
  • 2005
Gartner Survey Shows Frequent Data Security Lapses and Increased Cyber Attacks Damage Consumer Trust in Online Commerce
  • June
  • 2005
Kim Cameron’s Identity Weblog
  • May
  • 2005
Microsoft 05a] Microsoft. Microsoft's Vision for an Identity Metasystem. Microsoft Whitepaper
  • Microsoft 05a] Microsoft. Microsoft's Vision for an Identity Metasystem. Microsoft Whitepaper
  • 2005
Microsoft Whitepaper
  • May
  • 2005
Phishing Activity Trends Report
  • February
  • 2005
SourceID InfoCard STS Toolkit for Java
  • August
  • 2005
http://msdn.microsoft.com/winfx
  • PingID 05] Ping Identity. SourceID InfoCard STS Toolkit for Java
  • 2005
...
1
2
...