Trust requirements in identity management

  • Authors:
  • Audun Jøsang;John Fabre;Brian Hay;James Dalziel;Simon Pope

  • Affiliations:
  • Distributed Systems Technology Centre;Telstra Research Laboratories;Telstra Research Laboratories;Macquarie University;Distributed Systems Technology Centre

  • Venue:
  • ACSW Frontiers '05 Proceedings of the 2005 Australasian workshop on Grid computing and e-research - Volume 44
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Different identity management models will have different trust requirements. Since there are costs associated with establishing trust, it will be an advantage to have identity management models with simple trust requirements. The purpose of this paper is to describe trust problems in current approaches to identity management, and to propose some solutions.