UNIQuE: A User-Centric Framework for Network Identity Management

Network identity management system, in theory, is conceived as the solution to many identity-related issues burgeoning day-to-day. These issues, which need to be addressed, range from managing the outburst of user identities to protecting user interests as well as business interests. This paper proposes a framework for network identity management on the Internet that addresses these issues from a user-centric point of view. After discussing the challenges and opportunities of a user-centric identity management system, we describe the architecture of our framework called UNIQuE in detail. The architecture comprises components such as a security infrastructure, a trust subsystem, an inter-provider communication system, and a repository system. In essence, the goal of this framework is to specify a comprehensive, user-centric solution to all identity-related issues, which also vouches for effortless maintenance. The fundamental difference to existing systems is its integrating approach to many usually separately considered, identity-related issues

[1]  S. T. Buckland,et al.  An Introduction to the Bootstrap. , 1994 .

[2]  Yinan Yang,et al.  W3 Trust Model: Evluating Trust and Transitivity of Trust of Online Services , 2002, International Conference on Internet Computing.

[3]  Steven Hand,et al.  Managing Trust and Reputation in the XenoServer Open Platform , 2003, iTrust.

[4]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[5]  Henry Hexmoor,et al.  Trust-Based Security Policies , 2004 .

[6]  Audun Jøsang,et al.  Trust Requirements in Identity Management , 2005, ACSW.

[7]  Matt Bishop,et al.  The Solar Trust Model: authentication without limitation , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[8]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[9]  Jeff Hodges,et al.  A brief introduction to liberty , 2002 .

[10]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[11]  A. Abdul-Rahman,et al.  Relying on trust to find reliable information , 1999 .

[12]  Diego Gambetta Can We Trust Trust , 2000 .

[13]  Roy T. Fielding,et al.  Hypertext Transfer Protocol - HTTP/1.1 , 1997, RFC.

[14]  Rachael Ott,et al.  Building Trust Online , 2000 .

[15]  Theodosis Dimitrakos,et al.  System Models, e-Risks and e-Trust - Towards bridging the gap? , 2001, I3E.

[16]  Stephen Farrell,et al.  Internet X.509 Public Key Infrastructure Certificate Management Protocols , 1999, RFC.

[17]  Boon Thau Loo,et al.  Trust Management , 2006, Lecture Notes in Computer Science.

[18]  Sotirios Terzis,et al.  Security, Privacy and Trust Issues in Smart Environments , 2005 .

[19]  Deepak Goel,et al.  RATING: rigorous assessment of trust in identity management , 2006, First International Conference on Availability, Reliability and Security (ARES'06).

[20]  E. Drexler,et al.  Incentive engineering for computational resource management , 1988 .

[21]  Angelos D. Keromytis,et al.  Key note: Trust management for public-key infrastructures , 1999 .

[22]  Feng Zhu,et al.  A Stateless Network Architecture for Inter-Enterprise Authentication, Authorization and Accounting , 2003, ICWS.

[23]  Christian Cachin,et al.  Distributing trust on the Internet , 2001, 2001 International Conference on Dependable Systems and Networks.

[24]  J. Camenisch,et al.  Title: First Annual Research Report the Prime Project Receives Research Funding from the Community's Sixth Framework Programme and the Swiss Federal Office for Education and Science. Privacy and Identity Management for Europe Prime Privacy and Identity Management for Europe , 2005 .