Abstract
Mobile computing becoming a widespread working tool, and a large scale deployed technology, it should be strong enough to meet basic security expectations. Privacy in a mobile environment should be driven by the choice of appropriate identity management mechanisms, that will have a large impact on different aspects of daily life. But people being unable to spend all their time administering their digital identities, the implementation of mobile identity management technologies has become a top priority for involved companies, in order to protect their customers against fraudsters. Today, identity management and strong authentication are converging, since provided solutions encompass user access, signing and verification of users and transactions, through strong authentication. Although, simply using strong authentication will not resolve all mobile digital identity requirements from a security viewpoint; our objective is to propose an extensible protocol based on an independent architectural model that provides a foundation for user-centric identity management.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ENISA, “Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID)”, http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_mobile_eID.pdf
Arabo, A., Shi, Q., Merabti, M.: A Framework for User-Centered and Context-Aware Identity Management in Mobile Ad-hoc Networks (UCIM). School of Computing & Mathematical Sciences, Liverpool. John Moores University, UK
Vacca, J.R.: Computer and Information Security Handbook. Morgan Kaufmann Editions, San Francisco (2009), ISBN: 978-0-12-374354-1
Windley, P.: Digital Identity. O’Reilly Media, Inc., Sebastopol (2005)
Tsui, W.: Digital Identity Management on the Internet (April 28, 2006)
Final report, STORK-eID Consortium “ STORK Work Item 3.3.6 Mobile eID”
Microsoft, “Introducing Windows CardSpace”, http://msdn.microsoft.com/en-us/library/aa480189.aspx
Hinz, M., Fiala, Z.: Context modeling for device and location-aware mobile web applications. In: PERMID (2005)
José, S., et al.: New Architecture for a Centralized Next Generation Profile Register in Future Mobile Telecommunication Networks. In: INC (2006)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
En-Nasry, B., Dafir Ech-Cherif El Kettani, M. (2011). Towards an Open Framework for Mobile Digital Identity Management through Strong Authentication Methods. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-22365-5_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-22364-8
Online ISBN: 978-3-642-22365-5
eBook Packages: Computer ScienceComputer Science (R0)