Skip to main content

IMC: A Classification of Identity Management Approaches

  • Conference paper
  • First Online:
Computer Security (ESORICS 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12580))

Included in the following conference series:

Abstract

This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, describing characteristics of cooperation. The morphology is then mapped to the life cycle of users and identity management in a further step. These classifications are practically underlined with current approaches. Both methods combined provide a comprehensive characterization of identity management approaches. The methods help to choose suited approaches and implement needed tools.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Boujezza, H., AL-Mufti, M., Ayed, H.K.B., Saidane, L.: A taxonomy of identities management systems in IOT. In: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), pp. 1–8, November 2015. https://doi.org/10.1109/AICCSA.2015.7507266

  2. Ferdous, M.S., Chowdhury, F., Alassafi, M.O.: In search of self-sovereign identity leveraging blockchain technology. IEEE Access 7, 103059–103079 (2019). https://doi.org/10.1109/ACCESS.2019.2931173

    Article  Google Scholar 

  3. Gao, F., Zhang, F., Xia, J., Ma, Z.: General identity management model for big data analysis. In: 2016 18th International Conference on Advanced Communication Technology (ICACT), p. 1, January 2016. https://doi.org/10.1109/ICACT.2016.7423325

  4. Garschhammer, M., Roelle, H.: Requirements on quality specification posed by service orientation. In: Sahai, A., Wu, F. (eds.) DSOM 2004. LNCS, vol. 3278, pp. 1–14. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-30184-4_1

    Chapter  Google Scholar 

  5. GÉANT: edugain technical site (2020). https://technical.edugain.org/status.php. Accessed 25 Nov 2020

  6. Grabatin, M., Hommel, W., Metzger, S., Pöhn, D.: DAME: on-demand internet-scale SAML metadata exchange. Int. J. Adv. Syst. Meas. 8, 156–167 (2015)

    Google Scholar 

  7. Habiba, U., Masood, R., Shibli, M.A., Niazi, M.A.: Cloud identity management security issues & solutions: a taxonomy. Complex Adapt. Syst. Model. 2(1), 2194–3206 (2014). https://doi.org/10.1186/s40294-014-0005-9

    Article  Google Scholar 

  8. Kantara Initiative: Home - WG - User Managed Access (2020). https://kantarainitiative.org/confluence/display/uma/Home. Accessed 25 Nov 2020

  9. Milgram, L., Spector, A., Treger, M.: Chapter 21 - Plan, Do, Check, Act: The Deming or Shewhart Cycle, vol. Managing Smart. Gulf Professional Publishing (1999)

    Google Scholar 

  10. Pal, S., Hitchens, M., Varadharajan, V.: Modeling identity for the internet of things: survey, classification and trends. In: 2018 12th International Conference on Sensing Technology (ICST), pp. 45–51, December 2018. https://doi.org/10.1109/ICSensT.2018.8603595

  11. Ragouzis, N., Hughes, J., Philpott, R., Maler, E.: Security assertion markup language (SAML) V2.0 technical overview. Technical report, OASIS (2008)

    Google Scholar 

  12. Reed, D., et al.: Decentralized identifiers (DIDs) v1.0 - core architecture, data model, and representation. Technical report, W3C (2020)

    Google Scholar 

  13. Roßnagel, H.: A mechanism for discovery and verification of trust scheme memberships: the lightest reference architecture. In: Fritsch, L., Roßnagel, H., Hühnlein, D. (eds.) Open Identity Summit 2017, pp. 81–92. Gesellschaft für Informatik, Bonn (2017)

    Google Scholar 

  14. Sakimura, N., Bradley, J., Jones, M.B., de Medeiros, B., Mortimore, C.: OpenID connect core 1.0. Technical report, OpenID Foundation (2014)

    Google Scholar 

  15. Tobin, A., Reed, D.: The Inevitable Rise of Self-Sovereign Identity (2017). Accessed 25 Nov 2020

    Google Scholar 

  16. Cao, Y., Yang, L.: A survey of identity management technology. In: 2010 IEEE International Conference on Information Theory and Information Security, pp. 287–293, December 2010. https://doi.org/10.1109/ICITIS.2010.5689468

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Daniela Pöhn or Wolfgang Hommel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pöhn, D., Hommel, W. (2020). IMC: A Classification of Identity Management Approaches. In: Boureanu, I., et al. Computer Security. ESORICS 2020. Lecture Notes in Computer Science(), vol 12580. Springer, Cham. https://doi.org/10.1007/978-3-030-66504-3_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-66504-3_1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-66503-6

  • Online ISBN: 978-3-030-66504-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics