Abstract
This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, describing characteristics of cooperation. The morphology is then mapped to the life cycle of users and identity management in a further step. These classifications are practically underlined with current approaches. Both methods combined provide a comprehensive characterization of identity management approaches. The methods help to choose suited approaches and implement needed tools.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Boujezza, H., AL-Mufti, M., Ayed, H.K.B., Saidane, L.: A taxonomy of identities management systems in IOT. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8, November 2015. https://doi.org/10.1109/AICCSA.2015.7507266
Ferdous, M.S., Chowdhury, F., Alassafi, M.O.: In search of self-sovereign identity leveraging blockchain technology. IEEE Access 7, 103059–103079 (2019). https://doi.org/10.1109/ACCESS.2019.2931173
Gao, F., Zhang, F., Xia, J., Ma, Z.: General identity management model for big data analysis. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), p. 1, January 2016. https://doi.org/10.1109/ICACT.2016.7423325
Garschhammer, M., Roelle, H.: Requirements on quality specification posed by service orientation. In: Sahai, A., Wu, F. (eds.) DSOM 2004. LNCS, vol. 3278, pp. 1–14. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30184-4_1
GÉANT: edugain technical site (2020). https://technical.edugain.org/status.php. Accessed 25 Nov 2020
Grabatin, M., Hommel, W., Metzger, S., Pöhn, D.: DAME: on-demand internet-scale SAML metadata exchange. Int. J. Adv. Syst. Meas. 8, 156–167 (2015)
Habiba, U., Masood, R., Shibli, M.A., Niazi, M.A.: Cloud identity management security issues & solutions: a taxonomy. Complex Adapt. Syst. Model. 2(1), 2194–3206 (2014). https://doi.org/10.1186/s40294-014-0005-9
Kantara Initiative: Home - WG - User Managed Access (2020). https://kantarainitiative.org/confluence/display/uma/Home. Accessed 25 Nov 2020
Milgram, L., Spector, A., Treger, M.: Chapter 21 - Plan, Do, Check, Act: The Deming or Shewhart Cycle, vol. Managing Smart. Gulf Professional Publishing (1999)
Pal, S., Hitchens, M., Varadharajan, V.: Modeling identity for the internet of things: survey, classification and trends. In: 2018 12th International Conference on Sensing Technology (ICST), pp. 45–51, December 2018. https://doi.org/10.1109/ICSensT.2018.8603595
Ragouzis, N., Hughes, J., Philpott, R., Maler, E.: Security assertion markup language (SAML) V2.0 technical overview. Technical report, OASIS (2008)
Reed, D., et al.: Decentralized identifiers (DIDs) v1.0 - core architecture, data model, and representation. Technical report, W3C (2020)
Roßnagel, H.: A mechanism for discovery and verification of trust scheme memberships: the lightest reference architecture. In: Fritsch, L., Roßnagel, H., Hühnlein, D. (eds.) Open Identity Summit 2017, pp. 81–92. Gesellschaft für Informatik, Bonn (2017)
Sakimura, N., Bradley, J., Jones, M.B., de Medeiros, B., Mortimore, C.: OpenID connect core 1.0. Technical report, OpenID Foundation (2014)
Tobin, A., Reed, D.: The Inevitable Rise of Self-Sovereign Identity (2017). Accessed 25 Nov 2020
Cao, Y., Yang, L.: A survey of identity management technology. In: 2010 IEEE International Conference on Information Theory and Information Security, pp. 287–293, December 2010. https://doi.org/10.1109/ICITIS.2010.5689468
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Pöhn, D., Hommel, W. (2020). IMC: A Classification of Identity Management Approaches. In: Boureanu, I., et al. Computer Security. ESORICS 2020. Lecture Notes in Computer Science(), vol 12580. Springer, Cham. https://doi.org/10.1007/978-3-030-66504-3_1
Download citation
DOI: https://doi.org/10.1007/978-3-030-66504-3_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-66503-6
Online ISBN: 978-3-030-66504-3
eBook Packages: Computer ScienceComputer Science (R0)