Identity and access management for the distribution of social grants in South Africa
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Cross-identifier domain discovery service for unrelated user identities
Proceedings of the 4th ACM workshop on Digital identity management
Proceedings of the 2008 ACM workshop on Secure web services
Network authentication using single sign-on: the challenge of aligning mental models
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology
Trust-Assisted Handover Approach in Hybrid Wireless Networks
Wireless Personal Communications: An International Journal
Trust management model and architecture for context-aware service platforms
OTM'07 Proceedings of the 2007 OTM confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part II
Toward a unique person identifier model in the Slovak Republic
WSEAS Transactions on Computers
An interdisciplinary approach to address identity theft education
ACM SIGCAS Computers and Society - Special Issue on Selected Papers from ISTAS 2011
Security and Communication Networks
Analysing attribute aggregation models in federated identity management
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Different identity management models will have different trust requirements. Since there are costs associated with establishing trust, it will be an advantage to have identity management models with simple trust requirements. The purpose of this paper is to describe trust problems in current approaches to identity management, and to propose some solutions.