Experience with performing architecture tradeoff analysis
Proceedings of the 21st international conference on Software engineering
Privacy in browser-based attribute exchange
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Toward Secure Key Distribution in Truly Ad-Hoc Networks
SAINT-W '03 Proceedings of the 2003 Symposium on Applications and the Internet Workshops (SAINT'03 Workshops)
Layered identity infrastructure model for identity meta systems
AISC '08 Proceedings of the sixth Australasian conference on Information security - Volume 81
Comparison and Evaluation of Identity Management in Three Architectures for Virtual Organizations
IAS '08 Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security
Mobile technologies in mobile spaces: Findings from the context of train travel
International Journal of Human-Computer Studies
IEEE Internet Computing
Assessing identity and access management systems based on domain-specific performance evaluation
Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering
A cryptographic framework for the controlled release of certified data
SP'04 Proceedings of the 12th international conference on Security Protocols
TRUSTCOM '11 Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications
A Research Agenda Acknowledging the Persistence of Passwords
IEEE Security and Privacy
Hi-index | 0.00 |
Developments in the area of identity management have been subject to very little critique. Many implementations have gathered little general following, and larger scale adoption, such as OpenID, has been limited to internal systems and large identity providers. Previous evaluation has focussed on specific areas and does little to describe the trade off performed in the use of new identity management architectures. Furthermore, these evaluations have not equally considered user vs service provider perspective. This paper looks to derive a method for evaluation which encapsulates metrics from past work and areas which have not been considered. This method produces a holistic evaluation and comparison of identity management architectures.