Identity Management Architecture
Identity management plays a crucial role in many application contexts, including e-government, e-commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, has introduced new problems especially concerning interoperability and privacy. As such, any attempt to consolidate such diverse views and approaches to identity management in a systematic fashion requires a precise and rigorous unifying semantic framework. We propose here a firm semantic foundation for the systematic study of identity management and improved accuracy in reasoning about key properties in identity management system design. The proposed framework is built upon essential concepts of identity management and serves as a starting point for bringing together different approaches in a coherent and consistent manner.
KeywordsIdentity theft Identity resolution Information sharing Privacy and trust Semantic modeling
- 2.K. Cameron. The Laws of Identity [online], December 2005. Available: http://www.identityblog.com/?p=354.
- 4.L. J. Camp, et al. Identity in Digital Government: a research report of the Digital Government Civic Scenario Workshop, 2003. Research Report.Google Scholar
- 5.A. Cavoukian. 7 Laws of Identity: The Case for Privacy-Embedded Laws of Identity in the Digital Age, 2006.Google Scholar
- 9.Future of Identity in the Information Society – FIDIS (January 2008 – last visited) Website. [online]. Available: http://www.fidis.net.
- 10.U. Glässer and M. Vajihollahi. Identity Management Architecture. Technical Report SFU-CMPT-TR-2008-02, Simon Fraser University, February 2008.Google Scholar
- 11.J. Harper. Identity Crisis: How Identification Is Overused and Misunderstood. Cato Institute, 2006.Google Scholar
- 12.Independent Centre for Privacy Protection Schleswig-Holstein, Germany and Studio Genghini & Associati, Italy. Identity Management Systems (IMS): Identification and Comparison Study, 2003.Google Scholar
- 13.Javelin Strategy and Research, 2007 Identity Fraud Survey Report, February, 2007.Google Scholar
- 15.Liberty Alliance. Liberty Alliance Identity Federation Framework (ID-FF) 1.2 Specifications, December 2007.Google Scholar
- 16.Liberty Alliance Project (January 2008 – last visited) Website. [online]. Available: http://www.projectliberty.org
- 17.J. Phiri and J. Agbinya. Modelling and Information Fusion in Digital Identity Management Systems. In Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006, 181–187, 2006.Google Scholar
- 18.PISA – Privacy Incorporated Software Agent. Information Security, Privacy and Trust. (February 2008 – last visited) [online]. Available: http://www.iit-iti.nrc-cnrc.gc.ca/projectsprojets/pisa e.html.
- 19.PRIME – Privacy and Identity Management for Europe. (January 2008 – last visited) Website. [online]. Available: http://www.prime-project.eu.
- 20.Public Safety and Emergency Preparedness Canada. Report on Identity Theft, October 2004.Google Scholar
- 22.C. Satchell, G. Shanks, S. Howard, and J. Murphy. Beyond security: Implications for the future of federated digital identity management systems. In OZCHI’06: Proceedings of the 20th Conference of the Computer–Human Interaction Special Interest Group (CHISIG) of Australia on Computer–Human Interaction: Design: Activities, Artefacts and Environments, ACM, New York, 313–316, 2006.Google Scholar
- 23.S. Sproule and N. Archer. Defining identity theft. In Eighth World Congress on the Management of eBusiness (WCMeB 2007), 20–31, 2007.Google Scholar
- 24.G. van Blarkom, J. Borking, J. Giezen, R. Coolen, and P. Verhaar. Handbook of Privacy and Privacy-Enhancing Technologies – The Case of Intelligent Software Agents. College bescherming persoonsgegevens, 2003.Google Scholar
- 26.G. A. Wang, H. Atabakhsh, T. Petersen, and H. Chen. Discovering identity problems: A case study. In LNCS: Intelligence and Security Informatics. Springer, Berlin/Heidelberg, 2005.Google Scholar
- 27.G. A. Wang, H. Chen, and H. Atabakhsh. A probabilistic model for approximate identity matching. In J. A. B. Fortes and A. Macintosh, editors, Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, CA, May 21–24, 2006, 462–463. Digital Government Research Center, 2006.Google Scholar
- 29.P. J. Windley. Digital Identity, chapter Federating Identity. O’Reilly, Sebastopol, CA, 118–142, 2005.Google Scholar