User-centric identity governance across domain boundaries
Proceedings of the 5th ACM workshop on Digital identity management
Using identity credential usage logs to detect anomalous service accesses
Proceedings of the 5th ACM workshop on Digital identity management
User-centric handling of identity agent compromise
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
A persistent data tracking mechanism for user-centric identity governance
Identity in the Information Society
Hi-index | 0.00 |
The misuse of identity-related information in cyberspace is one of the biggest concerns among all Internet users. So far several technologies have been proposed and implemented to prevent and detect identity theft and misuse, but none of them are completely successful in terms of privacy, user-centricity and generality. In this paper, we identify the requirements for a user-centric identity-usage monitoring system to solve such problems and propose a monitoring system that runs on a trusted third party. This system can transparently use context information of a request to detect anomalous use of online identity. Finally, we provide a prototypical implementation in an OpenID setting and evaluate it in terms of scalability, performance, user-centricity, and security.