Identity Management Architecture

  • Uwe GlässerEmail author
  • Mona VajihollahiEmail author
Part of the Annals of Information Systems book series (AOIS, volume 9)


Identity management plays a crucial role in many application contexts, including e-government, e-commerce, business intelligence, investigation, and homeland security. The variety of approaches to and techniques for identity management, while addressing some of the challenges, has introduced new problems especially concerning interoperability and privacy. As such, any attempt to consolidate such diverse views and approaches to identity management in a systematic fashion requires a precise and rigorous unifying semantic framework. We propose here a firm semantic foundation for the systematic study of identity management and improved accuracy in reasoning about key properties in identity management system design. The proposed framework is built upon essential concepts of identity management and serves as a starting point for bringing together different approaches in a coherent and consistent manner.


Identity theft Identity resolution Information sharing Privacy and trust Semantic modeling 


  1. 1.
    E. Börger and R. Stärk. Abstract State Machines: A Method for High-Level System Design and Analysis. Springer-Verlag, Berlin, 2003.zbMATHGoogle Scholar
  2. 2.
    K. Cameron. The Laws of Identity [online], December 2005. Available:
  3. 3.
    J. L. Camp. Digital identity. Technology and Society Magazine, IEEE, 23:34–41, 2004.CrossRefGoogle Scholar
  4. 4.
    L. J. Camp, et al. Identity in Digital Government: a research report of the Digital Government Civic Scenario Workshop, 2003. Research Report.Google Scholar
  5. 5.
    A. Cavoukian. 7 Laws of Identity: The Case for Privacy-Embedded Laws of Identity in the Digital Age, 2006.Google Scholar
  6. 6.
    S. Clauß and M. Köhntopp. Identity Management and its Support of Multilateral Security. Computer Networks, 37(2):205–219, 2001.CrossRefGoogle Scholar
  7. 7.
    E. Damiani, S. D. C. di Vimercati, and P. Samarati. Managing multiple and dependable identities. Internet Computing, IEEE, 7:29–37, 2003.CrossRefGoogle Scholar
  8. 8.
    R. Farahbod, U. Glässer, and M. Vajihollahi. An Abstract Machine Architecture for Web Service Based Business Process Management. International Journal of Business Process Integration and Management, 1:279–291, 2007.CrossRefGoogle Scholar
  9. 9.
    Future of Identity in the Information Society – FIDIS (January 2008 – last visited) Website. [online]. Available:
  10. 10.
    U. Glässer and M. Vajihollahi. Identity Management Architecture. Technical Report SFU-CMPT-TR-2008-02, Simon Fraser University, February 2008.Google Scholar
  11. 11.
    J. Harper. Identity Crisis: How Identification Is Overused and Misunderstood. Cato Institute, 2006.Google Scholar
  12. 12.
    Independent Centre for Privacy Protection Schleswig-Holstein, Germany and Studio Genghini & Associati, Italy. Identity Management Systems (IMS): Identification and Comparison Study, 2003.Google Scholar
  13. 13.
    Javelin Strategy and Research, 2007 Identity Fraud Survey Report, February, 2007.Google Scholar
  14. 14.
    J. Jonas. Threat and fraud intelligence, Las Vegas style. Security & Privacy Magazine, IEEE, 4:28–34, 2006.CrossRefGoogle Scholar
  15. 15.
    Liberty Alliance. Liberty Alliance Identity Federation Framework (ID-FF) 1.2 Specifications, December 2007.Google Scholar
  16. 16.
    Liberty Alliance Project (January 2008 – last visited) Website. [online]. Available:
  17. 17.
    J. Phiri and J. Agbinya. Modelling and Information Fusion in Digital Identity Management Systems. In Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies, 2006. ICN/ICONS/MCL 2006, 181–187, 2006.Google Scholar
  18. 18.
    PISA – Privacy Incorporated Software Agent. Information Security, Privacy and Trust. (February 2008 – last visited) [online]. Available: e.html.
  19. 19.
    PRIME – Privacy and Identity Management for Europe. (January 2008 – last visited) Website. [online]. Available:
  20. 20.
    Public Safety and Emergency Preparedness Canada. Report on Identity Theft, October 2004.Google Scholar
  21. 21.
    C. D. Raab. Perspectives on ‘personal identity’. BT Technology Journal, 23:15–24, 2005.CrossRefGoogle Scholar
  22. 22.
    C. Satchell, G. Shanks, S. Howard, and J. Murphy. Beyond security: Implications for the future of federated digital identity management systems. In OZCHI’06: Proceedings of the 20th Conference of the Computer–Human Interaction Special Interest Group (CHISIG) of Australia on Computer–Human Interaction: Design: Activities, Artefacts and Environments, ACM, New York, 313–316, 2006.Google Scholar
  23. 23.
    S. Sproule and N. Archer. Defining identity theft. In Eighth World Congress on the Management of eBusiness (WCMeB 2007), 20–31, 2007.Google Scholar
  24. 24.
    G. van Blarkom, J. Borking, J. Giezen, R. Coolen, and P. Verhaar. Handbook of Privacy and Privacy-Enhancing Technologies – The Case of Intelligent Software Agents. College bescherming persoonsgegevens, 2003.Google Scholar
  25. 25.
    G. Wang, H. Chen, J. Xu, and H. Atabakhsh. Automatically detecting criminal identity deception: an adaptive detection algorithm. IEEE Transactions on Systems, Man and Cybernetics, Part A, 36:988–999, 2006.CrossRefGoogle Scholar
  26. 26.
    G. A. Wang, H. Atabakhsh, T. Petersen, and H. Chen. Discovering identity problems: A case study. In LNCS: Intelligence and Security Informatics. Springer, Berlin/Heidelberg, 2005.Google Scholar
  27. 27.
    G. A. Wang, H. Chen, and H. Atabakhsh. A probabilistic model for approximate identity matching. In J. A. B. Fortes and A. Macintosh, editors, Proceedings of the 7th Annual International Conference on Digital Government Research, DG.O 2006, San Diego, CA, May 21–24, 2006, 462–463. Digital Government Research Center, 2006.Google Scholar
  28. 28.
    W. Wang, Y. Yuan, and N. Archer. A contextual framework for combating identity theft. Security & Privacy Magazine, IEEE, 4:30–38, 2006.CrossRefGoogle Scholar
  29. 29.
    P. J. Windley. Digital Identity, chapter Federating Identity. O’Reilly, Sebastopol, CA, 118–142, 2005.Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  1. 1.Software Technology Lab, School of Computing ScienceSimon Fraser UniversityBurnabyCanada

Personalised recommendations