A user-centric PKI based-protocol to manage FC2 digital identities

نویسندگان

  • Samia Bouzefrane
  • Khaled Garri
  • Pascal Thoniel
چکیده

The proliferation of e-services (e.g. e-commerce, e-health, e-government) within the emerging digital Identity Management Systems make Internet an undeniable convenient and powerful tool for users. However in this environment, users are required to manage several digital identities and a great number of personal data. As such, simplification of users’ involvement is highly needed while increasing the users’ confidence, and guaranteeing security. This paper proposes a low-cost authentication solution which leads to a reduction of users’ identities, even across several circles of trust, while maintaining high-level security. This solution is suitable for FC2, a platform dedicated to manage digital identities within circles of trust.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Usability and Privacy in Identity Management Architectures

Digital identities represent who we are when engaging in online activities and transactions. The rapid growth in the number of online services leads to an increasing number of different identities that each user needs to manage. As a result, many people feel overloaded with identities and suffer from password fatigue. This is a serious problem and makes people unable properly control and protec...

متن کامل

Exploring a New World of Identity with Identity 2.0 based Solutions

On the Internet today, account registration is nearly always a requirement to interact with any website in a meaningful way. Each digital identity a user creates is a new and completely disjoint identity from all other existing digital identities of the user. These traditional identities, Identity 1.0 identities, are site-centric and centralized. Alternatively, Identity 2.0 identity solutions a...

متن کامل

Mobile Agent Code Updating and Authentication Protocol for Code-Centric RFID System

Traditional identification-centric RFID system (IRS) is designed to provide services of object identification/tracing/locating, but it has some shortcomings when encountering a dynamic environment in which the status of the systems and the service requirements of users/objects may change continuously. Very recently a new Code-centric RFID system (CRS), which is far different from the traditiona...

متن کامل

Portable User-Centric Identity Management

User-centric identity management has recently received significant attention for handling private and critical identity attributes. The notable idea of usercentric identity management allows users to control their own digital identities. Current user-centric identity management approaches are mainly focused on interoperable architectures between existing identity management systems. Normally, u...

متن کامل

A User-Centric System for Verified Identities on the Bitcoin Blockchain

We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin’s decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011