A User Centric Model for Online Identity and Access Management
نویسندگان
چکیده
The problem today is that users are expected to remember multiple user names and passwords for different domains when accessing the Internet. Identity management solutions seek to solve this problem by creating a digital identity that is exchangeable across organisational boundaries. This is done through the setup of collaboration agreements between multiple domains, thus users can easily switch across domains without having to repeatedly sign-on. However, this technology is accompanied by the threat of user identity and personal information being ‘stolen’. Criminals make use of fake or ‘spoofed’ websites as well as social engineering techniques to gain illegal access to a user’s information. This problem has been catapulted to the fore by the statement that phishing has increased by 8000% over the period January 2005 to September 2006 (APACS, 2007). Thus, the need for user protection from online threats has drastically increased. This paper examines two processes to protect user login information. Firstly, user’s information must be protected at the time of sign-on, and secondly, a simple method for the identification of the website is required by the user. This paper looks at these processes of identifying and verifying user information followed by how the user can verify the website at sign-on. The roles of identity and access management are defined within the context of single sign-on. Three different models for identity management are analysed, namely the Microsoft .NET Passport, Liberty Alliance Federated Identity for Single Sign-on and the Mozilla TrustBar for website authentication. A new model for the definitive protection of the user in the online environment is proposed based on the evaluation of these three existing models.
منابع مشابه
Portable User-Centric Identity Management
User-centric identity management has recently received significant attention for handling private and critical identity attributes. The notable idea of usercentric identity management allows users to control their own digital identities. Current user-centric identity management approaches are mainly focused on interoperable architectures between existing identity management systems. Normally, u...
متن کاملUser Centric Identity Management
Identity management is traditionally seen from the service providers’ point of view, meaning that it is an activity undertaken by the service provider to manage service user identities. Traditional identity management systems are designed to be cost effective and scalable primarily for the service providers, but not necessarily for the users, which often results in poor usability. Users are, fo...
متن کاملUser-Centric Handling of Identity Agent Compromise
Digital identity credentials are a key enabler for important online services, but widespread theft and misuse of such credentials poses serious risks for users. We believe that an identity management system (IdMS) that empowers users to become aware of how and when their identity credentials are used is critical for the success of such online services. Furthermore, rapid revocation and recovery...
متن کاملG-Profile: A Hybrid Solution for Extended Identity Management in the Field of Personalized Service Provision
In the digital world, many organizations are developing different applications (with different purposes) where users are generally represented by a heterogeneous set of attributes. From time to time, depending on the context, different attributes can provide different digital identities for the same user, often involved in the identification/authentication processes. In the personalized service...
متن کاملSecuring the Cloud
Identity management (IdM) is the complex and constantly evolving practice of identifying individuals and controlling their access to a network and connected resources. IdM research focuses primarily on making systems secure while the quality of the user experience is largely ignored. This article explores reasons why creating a user-centric IdM paradigm has become necessary, discusses existing ...
متن کامل