User-Centric Identity Management Using Trusted Modules

نویسندگان

  • Jan Vossaert
  • Jorn Lapon
  • Bart De Decker
  • Vincent Naessens
چکیده

Many service providers want to control access to their services and offer personalized services. This implies that the service provider requests and stores personal attributes. However, many service providers are not sure about the correctness of attributes that are disclosed by the user during registration. Federated identity management systems aim at increasing the user-friendliness of authentication procedures, while at the same time ensuring strong authentication to service providers. This paper presents a new flexible approach for user-centric identity management, using trusted modules. Our approach combines several privacy features available in current federated identity management systems and offers extra functionality. For instance, attribute aggregation is supported and the problem of user impersonization by identity providers is tacked.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Smart Card Based Solution for User-Centric Identity Management

This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules. The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication. This paper allows an evaluation of the practical feasibility of the identity management architecture and provides...

متن کامل

SIdeCAR: Secure Identity Consent and Authentication Responder

The Identity Metasystem is an interoperable, platform independent and protocol independent architecture for user centric identity management. User centric identity management is a new paradigm of identity management that addresses some of the drawbacks of the prevalent identity management models. This technology assumes that certain security sensitive functions of identity management are perfor...

متن کامل

An Approach for Preserving Privacy and Protecting Personally Identifiable Information in Cloud Computing

Privacy and security in cloud computing is an important concern for both the public and private sector. Cloud computing allows the use of internet-based services to support business process and rental of ITservices on a utility-like basis. While cloud computing offers a massive concentration of resources, it poses risks for privacy preservation. The expected loss from a single breach can be sig...

متن کامل

Citation for published version Chadwick , David W and Inman , George ( 2013 ) The Trusted Attribute Aggregation Service ( TAAS ) - Providing

We describe a web based federated identity management system loosely based on the user centric Windows CardSpace model. Unlike CardSpace that relies on a fat desktop client (the identity selector) in which the user can only select a single card per session, our model uses a standard web browser with a simple plugin that connects to a trusted attribute aggregation web service (TAAS). TAAS suppor...

متن کامل

A synchronous, open, user-centric, federated Identity and Access Management System (OpenIdAM)

It is acknowledged that the latest stable XML technologies, standards and specifications may build real interoperable and secure enterprise privacy-aware implementations. However, existing implementations do not address the users’ need to easily handle their identifiers and credentials while providing pluggable modules for interconnecting their pre-existing business applications and platforms. ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010