Skip to main content

Towards an Open Framework for Mobile Digital Identity Management through Strong Authentication Methods

  • Conference paper
Secure and Trust Computing, Data Management, and Applications (STA 2011)

Abstract

Mobile computing becoming a widespread working tool, and a large scale deployed technology, it should be strong enough to meet basic security expectations. Privacy in a mobile environment should be driven by the choice of appropriate identity management mechanisms, that will have a large impact on different aspects of daily life. But people being unable to spend all their time administering their digital identities, the implementation of mobile identity management technologies has become a top priority for involved companies, in order to protect their customers against fraudsters. Today, identity management and strong authentication are converging, since provided solutions encompass user access, signing and verification of users and transactions, through strong authentication. Although, simply using strong authentication will not resolve all mobile digital identity requirements from a security viewpoint; our objective is to propose an extensible protocol based on an independent architectural model that provides a foundation for user-centric identity management.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ENISA, “Security Issues in the Context of Authentication Using Mobile Devices (Mobile eID)”, http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_mobile_eID.pdf

  2. Arabo, A., Shi, Q., Merabti, M.: A Framework for User-Centered and Context-Aware Identity Management in Mobile Ad-hoc Networks (UCIM). School of Computing & Mathematical Sciences, Liverpool. John Moores University, UK

    Google Scholar 

  3. Vacca, J.R.: Computer and Information Security Handbook. Morgan Kaufmann Editions, San Francisco (2009), ISBN: 978-0-12-374354-1

    Google Scholar 

  4. Windley, P.: Digital Identity. O’Reilly Media, Inc., Sebastopol (2005)

    MATH  Google Scholar 

  5. Tsui, W.: Digital Identity Management on the Internet (April 28, 2006)

    Google Scholar 

  6. Final report, STORK-eID Consortium “ STORK Work Item 3.3.6 Mobile eID”

    Google Scholar 

  7. Microsoft, “Introducing Windows CardSpace”, http://msdn.microsoft.com/en-us/library/aa480189.aspx

  8. Hinz, M., Fiala, Z.: Context modeling for device and location-aware mobile web applications. In: PERMID (2005)

    Google Scholar 

  9. José, S., et al.: New Architecture for a Centralized Next Generation Profile Register in Future Mobile Telecommunication Networks. In: INC (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

En-Nasry, B., Dafir Ech-Cherif El Kettani, M. (2011). Towards an Open Framework for Mobile Digital Identity Management through Strong Authentication Methods. In: Lee, C., Seigneur, JM., Park, J.J., Wagner, R.R. (eds) Secure and Trust Computing, Data Management, and Applications. STA 2011. Communications in Computer and Information Science, vol 187. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-22365-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-22365-5_8

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-22364-8

  • Online ISBN: 978-3-642-22365-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics