Skip to:Content
|
Bottom
Cover image for Identity management : concepts, technologies, and systems
Title:
Identity management : concepts, technologies, and systems
Personal Author:
Series:
Information security and privacy series

Artech House information security and privacy series.
Publication Information:
Boston : Artech House, [2011], ©2011.
Physical Description:
196 pages : illustrations ; 24 cm.
ISBN:
9781608070398
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010312161 TK5105.55 B473 2011 Open Access Book Book
Searching...

On Order

Summary

Summary

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers an in-depth understanding of how to design, deploy and assess identity management solutions.


Author Notes

Elisa Bertino is a professor and research director at Purdue University in West Lafayette, Indiana. She holds a Ph.D. in computer science and is a Fellow of the IEEE Computer Society and the Association for Computing Machinery.
Kenji Takahashi is the president and CEO of NTT Multimedia Communications Laboratories, Inc., in San Mateo, California. He received a Ph.D. in computer science from the Tokyo Institute of Technology.


Table of Contents

1 Introductionp. 11
1.1 Stakeholders and Business Opportunitiesp. 12
1.2 Identity Ecosystem and Key Trendsp. 14
1.3 Challenges in Identity Managementp. 18
1.4 Overview of This Bookp. 18
Referencesp. 19
2 What Is Identity Management?p. 21
2.1 Stakeholders and Their Requirementsp. 25
2.1.1 Subjectsp. 25
2.1.2 Identity Providersp. 27
2.1.3 Relying Partiesp. 27
2.1.4 Control Partiesp. 28
2.1.5 Relationships Between Stakeholdersp. 28
2.2 Identity Life Cyclep. 29
2.2.1 Creationp. 30
2.2.2 Usagep. 32
2.2.3 Updatep. 34
2.2.4 Revocationp. 35
2.2.5 Governancep. 36
2.3 Identity Assurancep. 37
Referencesp. 41
3 Fundamental Technologies and Processesp. 45
3.1 Credentialsp. 46
3.1.1 Basic Conceptsp. 46
3.1.2 Public-Key Certificates and Public-Key Infrastructuresp. 48
3.1.3 Attribute and Authorization Certificatesp. 51
3.1.4 Credential Delegationp. 52
3.1.5 Proxy Certificatesp. 54
3.2 Single Sign-Onp. 55
3.2.1 Kerberos Protocolsp. 57
3.2.2 Reverse Proxy-Based SSOp. 60
3.3 Attribute Federationp. 61
3.3.1 Distributed Mediationp. 63
3.3.2 Single Party-Based Mediationp. 63
3.4 Privacyp. 65
3.4.1 Pseudonym Systemsp. 66
3.4.2 Anonymous Credentialsp. 68
3.5 Assurance and Compliancep. 70
Referencesp. 71
4 Standards and Systemsp. 75
4.1 Overviewp. 76
4.2 OASIS Security Assertion Markup Language (SAML)p. 77
4.2.1 Overviewp. 77
4.2.2 Specification Structurep. 79
4.2.3 Web SSOp. 86
4.2.4 Use Casesp. 92
4.3 Liberty Identity Web Services Frameworkp. 93
4.3.1 Opt-In Discovery Registrationp. 96
4.3.2 Dynamic Acquisition of Consent from Subjectsp. 96
4.3.3 Federated Identity-Based Access Controlp. 97
4.3.4 Pseudonym Mappingp. 97
4.3.5 Use Casesp. 97
4.4 OpenIDp. 98
4.4.1 Overviewp. 98
4.4.2 Authenticationp. 98
4.4.3 Attribute Exchange (AX)p. 101
4.4.4 Provider Authentication Policy Extension (PAPE)p. 101
4.4.5 Simple Registration (SREG)p. 102
4.4.6 Use Casesp. 102
4.5 Information Card-Based Identity Management (IC-IDM)p. 104
4.5.1 Overviewp. 104
4.5.2 WS-MetadataExchangep. 108
4.5.3 WS-Trustp. 108
4.5.4 Use Casesp. 108
4.6 Towards Interoperabilityp. 110
4.6.1 Use Casesp. 111
4.6.2 Comparative Analysis of SAML, OpenID, and Information Cardsp. 119
4.7 Security Analysisp. 121
4.7.1 Confidentialityp. 122
4.7.2 Integrityp. 126
4.7.3 Availabilityp. 127
4.7.4 Repudiationp. 128
4.7.5 Authenticationp. 129
4.7.6 Authorizationp. 129
4.8 Privacy Analysisp. 130
4.9 Research Prototypesp. 131
4.9.1 SASSOp. 132
4.9.2 VeryIDXp. 133
4.9.3 SWIFTp. 134
4.9.4 Emerging Areas: Social Networks, Mobile, and Cloud Computingp. 134
Referencesp. 139
5 Challengesp. 147
5.1 Usabilityp. 148
5.1.1 Usability Principles and Requirementsp. 148
5.1.2 Evaluating the Usability of Identity Management Solutionsp. 151
5.1.3 Antiphishing Measuresp. 152
5.2 Access Controlp. 153
5.3 Privacy Protectionp. 155
5.3.1 Privacy Policiesp. 156
5.3.2 Anonymization of Personally Identifiable Information and Privacy-Preserving Data Miningp. 162
5.3.3 Privacy Protection in Emerging Servicesp. 166
5.4 Trust Managementp. 167
5.4.1 Reputation of the Partyp. 167
5.4.2 Objective Verification of Certain Party Characteristicsp. 168
5.4.3 Possession of Credentials Attesting Certain Party Identity Informationp. 168
5.4.4 Trust in the Context of Identity Managementp. 169
5.5 Interoperability Challengep. 169
5.5.1 Universal User Experiencesp. 170
5.5.2 Naming Heterogeneity Managementp. 170
5.6 Biometricsp. 171
Referencesp. 175
6 Conclusionsp. 181
Referencesp. 185
About the Authorsp. 187
Indexp. 189
Go to:Top of Page