Security without identification: transaction systems to make big brother obsolete
Communications of the ACM
Net worth: shaping markets when customers make the rules
Net worth: shaping markets when customers make the rules
User privacy-preserving identity data dependencies
Proceedings of the second ACM workshop on Digital identity management
A privacy preserving assertion based policy language for federation systems
Proceedings of the 12th ACM symposium on Access control models and technologies
Identity and access management for the distribution of social grants in South Africa
Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
A privacy-aware access control system
Journal of Computer Security - 20th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec'06)
Privacy policies compliance across digital identity management systems
SPRINGL '08 Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS
User-centric identity governance across domain boundaries
Proceedings of the 5th ACM workshop on Digital identity management
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Journal of Computer Security - EU-Funded ICT Research on Trust and Security
Privacy-enhanced user-centric identity management
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
A persistent data tracking mechanism for user-centric identity governance
Identity in the Information Society
Enhancing user privacy through data handling policies
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Policy-based integration of user and provider-sided identity management
ETRICS'06 Proceedings of the 2006 international conference on Emerging Trends in Information and Communication Security
Enhancing consumer privacy in the liberty alliance identity federation and web services frameworks
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Privacy in the electronic society
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Hi-index | 0.00 |
We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of identity is the important component of this vehicle. Identity management has been recently considered to be a viable solution for simplifying user management across enterprise applications. The network identity of each user is the global set of personal credentials and preferences constituting the various accounts. The prevalence of business alliances or coalitions necessitates the further evolution of identity management, named federated identity management (FIM). The main motivation of FIM is to facilitate the federation of identities among business partners emphasizing on ease of user management. In this paper, we investigate privacy issues in FIM, especially focusing on Liberty Alliance approach. We attempt to identify practical business scenarios that help us understand privacy issues in FIM. Also, we propose systematic mechanisms to specify privacy preferences in FIM.