Identity management architecture

Identity Management plays a crucial role in many application contexts, including e-Governments, e-Commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, have introduced new problems, especially concerning interoperability and privacy. We focus here on two fundamental issues within this context: (1) a firm unifying semantic foundation for the systematic study of identity management and improved accuracy in reasoning about key properties in identity management system design, and (2) the practical relevance of developing a distributed approach to identity management (as opposed to a centralized one). The proposed mathematical framework is built upon essential requirements of an identity management system (such as privacy, user-control, and minimality), and serves as a starting point for bringing together different approaches in a systematic fashion in order to develop a distributed architecture for identity management.

[1]  H. Chen,et al.  Automatically detecting criminal identity deception: an adaptive detection algorithm , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[2]  Wenjie Wang,et al.  A contextual framework for combating identity theft , 2006, IEEE Security & Privacy.

[3]  Yingxu Wang,et al.  Editorial Recent Advances in Cognitive Informatics , 2006, IEEE Trans. Syst. Man Cybern. Syst..

[4]  Charles D. Raab Perspectives on ‘personal identity’ , 2005 .

[5]  Roozbeh Farahbod,et al.  An abstract machine architecture for web service based business process management , 2006, Int. J. Bus. Process. Integr. Manag..

[6]  Hsinchun Chen,et al.  A probabilistic model for approximate identity matching , 2006, DG.O.

[7]  Egon Börger,et al.  Abstract State Machines. A Method for High-Level System Design and Analysis , 2003 .

[8]  Sabrina De Capitani di Vimercati,et al.  Managing Multiple and Dependable Identities , 2003, IEEE Internet Comput..

[9]  Sebastian Clauß,et al.  Identity management and its support of multilateral security , 2001, Comput. Networks.

[10]  Hsinchun Chen,et al.  Discovering Identity Problems: A Case Study , 2005, ISI.

[11]  Roozbeh Farahbod,et al.  Dynamic resource management for adaptive distributed information fusion in large volume surveillance , 2008, SPIE Defense + Commercial Sensing.

[12]  Jeff Jonas Threat and Fraud Intelligence, Las Vegas Style , 2006, IEEE Secur. Priv..

[13]  N. Archer,et al.  Defining Identity Theft , 2007, Eighth World Congress on the Management of eBusiness (WCMeB 2007).

[14]  L. Jean Camp,et al.  Digital identity , 2004, IEEE Technology and Society Magazine.

[15]  Graeme G. Shanks,et al.  Beyond security: implications for the future of federated digital identity management systems , 2006, OZCHI '06.

[16]  L. Jean Camp,et al.  Identity in Digital Government , 2004 .

[17]  Johnson I. Agbinya,et al.  Modelling and Information Fusion in Digital Identity Management Systems , 2006, International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06).