Benefits of Federated Identity Management - A Survey from an Integrated Operations Viewpoint

  • Jostein Jensen
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6908)


Federated Identity Management is considered a promising approach to facilitate secure resource sharing between collaborating partners. A structured survey has been carried out in order to document the benefits of adopting such systems from a user and business perspective, and also to get an indication on how Integrated Operations in the oil and gas industry can benefit from identity federations. This has resulted in a set of benefit categories grouping existing claims from researchers. The literature indicates that adoption of Federated Identity Management in Integrated Operation seems like a good idea, however, there are several challenges that need to be solved.


Identity Management User Perspective Improve Data Quality Business Perspective Integrate Operation 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Reference architecture of it systems for olfs io g2. Tech. Rep. OLF report, OLF (2008)Google Scholar
  2. 2.
    Ahn, G.J., Lam, J.: Managing privacy preferences for federated identity management (2005)Google Scholar
  3. 3.
    Ahn, G.J., Shin, D., Hong, S.P.: Information assurance in federated identity management: Experimentations and issues. In: Zhou, X., Su, S., Papazoglou, M.P., Orlowska, M.E., Jeffery, K. (eds.) WISE 2004. LNCS, vol. 3306, pp. 78–89. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  4. 4.
    Almenarez, F., Arias, P., Marin, A., Diaz, D.: Towards dynamic trust establishment for identity federation (2009)Google Scholar
  5. 5.
    Arias Cabarcos, P., Almenarez Mendoza, F., Marin-Lopez, A., Diaz-Sanchez, D.: Enabling saml for dynamic identity federation management. In: Wozniak, J., Konorski, J., Katulski, R., Pach, A. (eds.) Wireless and Mobile Networking. IFIP Advances in Information and Communication Technology, vol. 308, pp. 173–184. Springer, Boston (2009)CrossRefGoogle Scholar
  6. 6.
    Balasubramaniam, S., Lewis, G.A., Morris, E., Simanta, S., Smith, D.B.: Identity management and its impact on federation in a system-of-systems context. In: 2009 3rd Annual IEEE Systems Conference, pp. 179–182 (2009)Google Scholar
  7. 7.
    Baldwin, A., Mont, M.C., Beres, Y., Shiu, S.: Assurance for federated identity management. J. Comput. Secur. 18(4), 541–572 (2010)Google Scholar
  8. 8.
    Bertino, E., Martino, L., Paci, F., Squicciarini, A., Martino, L.D., Squicciarini, A.C.: Standards for web services security. In: Security for Web Services and Service-Oriented Architectures, pp. 45–77. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  9. 9.
    Bhargav-Spantzel, A., Squicciarini, A.C., Bertino, E.: Establishing and protecting digital identity in federation systems (2005)Google Scholar
  10. 10.
    Brossard, D., Dimitrakos, T., Gaeta, A.: Aspects of general security & trust. In: Dimitrakos, T., Martrat, J., Wesner, S. (eds.) Service Oriented Infrastructures and Cloud Service Platforms for the Enterprise, pp. 75–102. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  11. 11.
    Chadwick, D.: Federated identity management. In: Aldini, A., Barthe, G., Gorrieri, R. (eds.) Foundations of Security Analysis and Design V. LNCS, vol. 5705, pp. 96–120. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  12. 12.
    Elberawi, A.S., Abdel-Hamid, A., El-Sonni, M.T.: Privacy-preserving identity federation middleware for web services (pifm-ws). In: 2010 International Conference on Computer Engineering and Systems (ICCES), pp. 213–220 (2010)Google Scholar
  13. 13.
    Gomi, H., Hatakeyama, M., Hosono, S., Fujita, S.: A delegation framework for federated identity management (2005)Google Scholar
  14. 14.
    Han, J., Mu, Y., Susilo, W., Yan, J.: A generic construction of dynamic single sign-on with strong security. In: Jajodia, S., Zhou, J. (eds.) Security and Privacy in Communication Networks. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 50, pp. 181–198. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  15. 15.
    Hoellrigl, T., Dinger, J., Hartenstein, H.: A consistency model for identity information in distributed systems. In: 2010 IEEE 34th Annual Computer Software and Applications Conference (COMPSAC), pp. 252–261 (2010)Google Scholar
  16. 16.
    Kang, M., Khashnobish, A.: A peer-to-peer federated authentication system. In: Sixth International Conference on Information Technology: New Generations, ITNG 2009, pp. 382–387 (2009)Google Scholar
  17. 17.
    Kitchenham, B.: Procedures for performing systematic reviews. Tech. Rep. TR/SE-0401, Keele University (2004)Google Scholar
  18. 18.
    Landau, S., Le Van Gong, H., Wilton, R.: Achieving privacy in a federated identity management system. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 51–70. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  19. 19.
    Lilleng, T., et al.: Edrift på norsk sokkel - det tredje effektiviseringsspranget. Tech. Rep. OLF report, OLF (2003)Google Scholar
  20. 20.
    Madsen, P., Koga, Y., Takahashi, K.: Federated identity management for protecting users from id theft (2005)Google Scholar
  21. 21.
    Maler, E., Reed, D.: The venn of identity: Options and issues in federated identity management. IEEE Security & Privacy 6(2), 16–23 (2008)CrossRefGoogle Scholar
  22. 22.
    Ranga, G., Flowerday, S.: Identity and access management for the distribution of social grants in south africa (2007)Google Scholar
  23. 23.
    Rieger, S.: User-centric identity management in heterogeneous federations. In: Fourth International Conference on Internet and Web Applications and Services, ICIW 2009, pp. 527–532 (2009)Google Scholar
  24. 24.
    Satchell, C., Shanks, G., Howard, S., Murphy, J.: Beyond security: implications for the future of federated digital identity management systems (2006)Google Scholar
  25. 25.
    Schell, F., Dinger, J., Hartenstein, H.: Performance evaluation of identity and access management systems in federated environments. In: Mueller, P., Cao, J.N., Wang, C.L. (eds.) Scalable Information Systems. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, vol. 18, pp. 90–107. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  26. 26.
    Scudder, J., Jøsang, A.: Personal federation control with the identity dashboard. In: de Leeuw, E., Fischer-Hübner, S., Fritsch, L. (eds.) Policies and Research in Identity Management. IFIP Advances in Information and Communication Technology, vol. 343, pp. 85–99. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  27. 27.
    Sharma, A.K., Lamba, C.S.: Survey on federated identity management systems. In: Meghanathan, N., Boumerdassi, S., Chaki, N., Nagamalai, D. (eds.) Recent Trends in Networks and Communications. CCIS, vol. 90, pp. 509–517. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  28. 28.
    Shim, S.S.Y., Geetanjali, B., Vishnu, P.: Federated identity management. Computer 38(12), 120–122 (2005)CrossRefGoogle Scholar
  29. 29.
    Sliman, L., Badr, Y., Biennier, F., Salatge, N., Nakao, Z.: Single sign-on integration in a distributed enterprise service bus. In: International Conference on Network and Service Security, N2S 2009, pp. 1–5 (2009)Google Scholar
  30. 30.
    Smith, D.: The challenge of federated identity management. Network Security (4), 7–9 (2008)Google Scholar
  31. 31.
    Speltens, M., Patterson, P.: Federated id management - tackling risk and credentialing users. In: ISSE/SECURE 2007 Securing Electronic Business Processes, pp. 130–135. Vieweg (2007)Google Scholar
  32. 32.
    Squicciarini, A.C., Czeskis, A., Bhargav-Spantzel, A.: Privacy policies compliance across digital identity management systems (2008)Google Scholar
  33. 33.
    Wolf, M., Thomas, I., Menzel, M., Meinel, C.: A message meta model for federated authentication in service-oriented architectures. In: 2009 IEEE International Conference on Service-Oriented Computing and Applications (SOCA), pp. 1–8 (2009)Google Scholar
  34. 34.
    Zuo, Y., Luo, X., Zeng, F.: Towards a dynamic federation framework based on saml and automated trust negotiation. In: Wang, F.L., Gong, Z., Luo, X., Lei, J. (eds.) Web Information Systems and Mining. LNCS, vol. 6318, pp. 254–262. Springer, Heidelberg (2010)CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2011

Authors and Affiliations

  • Jostein Jensen
    • 1
  1. 1.Department of Computer and Information ScienceNorwegian University of Science and TechnologyNorway

Personalised recommendations