The International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007) 2007
DOI: 10.1109/secureware.2007.4385303
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of User-centric Identity Management Technologies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
35
0
4

Year Published

2009
2009
2024
2024

Publication Types

Select...
5
2
2

Relationship

1
8

Authors

Journals

citations
Cited by 71 publications
(39 citation statements)
references
References 3 publications
0
35
0
4
Order By: Relevance
“…So far, all initiatives to achieve it have not succeeded; a global PKI (Public Key Infrastructure) has been deemed not feasible. Social and federated logins [21], even though useful, cannot be tied properly to a real-world identity because identities can be easily faked: for example, fake and zombie Facebook accounts are still a problem. Of course, if linking the user client with its real-world identity is done via strong authentication, the legal liability of the user client can be enforced but otherwise the hotspot sharer may be deemed liable in many countries.…”
Section: Hotspot Security and Remaining Threatsmentioning
confidence: 99%
“…So far, all initiatives to achieve it have not succeeded; a global PKI (Public Key Infrastructure) has been deemed not feasible. Social and federated logins [21], even though useful, cannot be tied properly to a real-world identity because identities can be easily faked: for example, fake and zombie Facebook accounts are still a problem. Of course, if linking the user client with its real-world identity is done via strong authentication, the legal liability of the user client can be enforced but otherwise the hotspot sharer may be deemed liable in many countries.…”
Section: Hotspot Security and Remaining Threatsmentioning
confidence: 99%
“…According to El Maliki et al [17] there are some basic rules which have been considered in the new user-centric identity paradigm, specifically: 1) Enhancing the user privacy by providing them full control over their identity information 2) Usability and user experience quality as a result of consistent identity interface and using the same identity for each identity transaction 3) Decreasing identity attacks, including phishing 4) Reducing reachability/disturbances caused by spams 5) Policy specification on both sides, identity providers and service providers 6) Profiting from huge scalability 7) Providing secure conditions at the time of data exchange 8) Separating the digital data from applications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…So far, all initiatives to achieve it have not succeeded; a global PKI (Public Key Infrastructure) has been deemed not feasible. Social and federated logins [14], …”
Section: Hotspots Security and Remaining Threatsmentioning
confidence: 99%