User-centric Mobile Identity Management Services
نویسندگان
چکیده
Digital identity is the ground necessary to guarantee that the Internet infrastructure is strong enough to meet basic expectations such as security and privacy. Anywhere anytime mobile computing is becoming true. In this ambient intelligent world, the choice of the identity management mechanisms will have a large impact on social, cultural, business and political aspects: privacy is a human need and the all of society would suffer from the de-mise of privacy; people have hectic life and cannot spend their whole time administering their digital identities. The choice of identity mechanisms will change the social, cultural, business and political environment. Furthermore, the identity management is also a promising topic for modern society. Recent technological advance in user identity management has highlighted the paradigm of federated identity management and usercentric identity management as improved alternatives. The first one empowers the management of identity and the second the users to actively manage their identity information and profiles. It also allows providers to deal easily with privacy aspects regarding user expectations. This problem has been tackled with some trends and emerging solutions. Firstly, we provide an overview of identity management from identity 1.0 to identity 2.0 with emphasis on user centric approaches. Also we survey how have evolved the requirements for user-centric identity management and their associated technologies with emphasis on the federated approaches and user-centricity. Secondly, we will focus on related standards XRI and LID issued from Yadis project, and platforms mainly ID-WSF, OpenID, InfoCard, Sxip and Higgins. At the end, we treat the identity management in the field of mobility and focus on the future of mobile identity management.
منابع مشابه
OFELIA - A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management
Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with the...
متن کاملCommunity-centric mobile peer-to-peer services: performance evaluation and user studies
The popularity of social networking services emphasises the importance of user communities. As the next evolutionary step, social networking will evolve towards user communities that are dynamically established according to contextual aspects such as the shared location and/or activities of people. In this vision, distributed peer-to-peer (P2P) technologies provide a respectable alternative to ...
متن کاملToward the Design of Rural Intelligent Public Transportation System Rural Public Transportation of Iran
In order to improve the level of intelligence, availability, being on demand, convenience, information and humanization of rural public transportation systems, they are more willing to use modern information and communicative technologies. In addition to management services, intelligent transportation systems can provide passengers, drivers, travel agencies and other institutions with other ser...
متن کاملUser-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery...
متن کاملThreat Modeling an Identity Management System for Mobile Internet
The advent of Mobile Internet and Web 2.0 raised the need for identity-oriented and user-centric services. In recent years, many Identity Management Systems (IdMS) have been developed to allow users to safely control and reuse their identity attributes. Service providers and users rely on the trust that the mechanisms provided by the IdMS are secure. However, if an attacker succeeds in exploiti...
متن کامل