Identity management with trust relationship and privacy preservation

作者: Xiang Zou , Bo Jin

DOI: 10.1109/ICITIS.2010.5689598

关键词: Information privacyUser experience designService providerIdentity (object-oriented programming)Internet privacyComputer securityAuthenticationMutual authenticationIdentity managementComputer scienceUsability

摘要: Achieving trust relationship with privacy preservation is one of the key purposes identity management. A novel management model proposed to build among different parties through validation and authentication. two-way handshake process two variants introduced implement strong mutual authentication between users service providers without revealing real world identities users. Security analysis experiments show that confidentiality, integrity, usability protection ability for both are enhanced effectively good user experience high performance.

参考文章(12)
Wolfgang Hommel, An architecture for privacy-aware inter-domain identity management distributed systems operations and management. pp. 48- 59 ,(2005) , 10.1007/11568285_5
Andreas Pashalidis, Chris J. Mitchell, A taxonomy of single sign-on systems australasian conference on information security and privacy. pp. 249- 264 ,(2003) , 10.1007/3-540-45067-X_22
T. Dierks, C. Allen, The TLS Protocol Version 1.0 IETF RFC 2246. ,vol. 2246, pp. 1- 80 ,(1999)
David Recordon, Drummond Reed, OpenID 2.0 Proceedings of the second ACM workshop on Digital identity management - DIM '06. pp. 11- 16 ,(2006) , 10.1145/1179529.1179532
Audun Jøsang, Simon Pope, User Centric Identity Management ,(2005)
Latifa Boursas, Wolfgang Hommel, Policy-based Service Provisioning and Dynamic Trust Management in Identity Federations international conference on communications. ,vol. 5, pp. 2370- 2375 ,(2006) , 10.1109/ICC.2006.255124
D. Solo, R. Housley, W. Ford, W. Polk, Internet X.509 Public Key Infrastructure Certificate and CRL Profile RFC. ,vol. 2459, pp. 1- 129 ,(1999)
Audun Jøsang, Simon Pope, James Dalziel, Brian Hay, John Fabre, Trust requirements in identity management grid computing. pp. 99- 108 ,(2005)
Claudio A. Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio, Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project Journal of Computer Security. ,vol. 18, pp. 123- 160 ,(2010) , 10.3233/JCS-2010-0367
Audun Jøsang, Suriadi Suriadi, Muhammed Al Zomai, Usability and privacy in identity management architectures privacy enhancing technologies. pp. 143- 152 ,(2007)