Proceedings of the 2005 Workshop on Digital Identity Management 2005
DOI: 10.1145/1102486.1102500
|View full text |Cite
|
Sign up to set email alerts
|

Federated identity management for protecting users from ID theft

Abstract: Federated identity management is sometimes criticized as exacerbating the problem of online identity theft, based as it is on the idea of connecting together previously separate islands of identity information. This paper explores this conjecture, and argues that, while such linkages do undeniably increase the potential scope of a successful theft of identity information, this risk is more than offset by the much greater value federated identity, in combination with strong authentication, offers in preventing … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2006
2006
2015
2015

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 28 publications
(25 citation statements)
references
References 2 publications
0
25
0
Order By: Relevance
“…Recent examples, such as the mass theft of credit card data, are well-known for this [21]. "Federated identity management" solutions in which one system accepts the identity and authentication mechanisms of another are "sometimes criticized as exacerbating the problem of online identity theft" [24].…”
Section: Interoperability Of E-government Information Systems 31mentioning
confidence: 99%
See 2 more Smart Citations
“…Recent examples, such as the mass theft of credit card data, are well-known for this [21]. "Federated identity management" solutions in which one system accepts the identity and authentication mechanisms of another are "sometimes criticized as exacerbating the problem of online identity theft" [24].…”
Section: Interoperability Of E-government Information Systems 31mentioning
confidence: 99%
“…There is a strong technical bias in the research and development of identity management-related concepts. Notions such as digital signatures, authentication, smart cards, identity federation [24], and so forth, require and encompass advanced technical approaches to handle digital identities [7]. Nevertheless, paper-based identifiers for identifying natural persons and legal entities have existed for decades.…”
Section: Identity Identification and Identifiersmentioning
confidence: 99%
See 1 more Smart Citation
“…This will enable users to sign in wherever they are and monitoring between the companies will become more effective. The system should consider incorporating a Federated Identity Management (FIDM) model which manages identities across policy and/or application domains in which the identity data is distributed [6,7]. In addition it should ensure that there is proper authentication and authorisation of individuals in order to address points 1, 3 and 5 [5].…”
Section: Suggested Solutions and Conclusionmentioning
confidence: 99%
“…Recently, several practical solutions against on-line identity theft have been proposed [2,16]. In this section, we first analyze causes of a successful identity theft.…”
Section: Reducing the Risks Of Identity Theftmentioning
confidence: 99%