Identity Management: Concepts, Technologies, and SystemsDigital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle. |
Contents
| 11 | |
Concepts Technologies and Systems 2 What Is Identity Management? | 21 |
Concepts Technologies and Systems 21 Stakeholders and Their Requirements | 25 |
Concepts Technologies and Systems 22 Identity Life Cycle | 29 |
Concepts Technologies and Systems 23 Identity Assurance | 37 |
Concepts Technologies and Systems References | 41 |
Concepts Technologies and Systems 3 Fundamental Technologies andProcesses | 45 |
Concepts Technologies and Systems 4 Standards and Systems | 75 |
Concepts Technologies and Systems 5 Challenges | 147 |
Concepts Technologies and Systems 6 Conclusions | 181 |
Concepts Technologies and Systems About the Authors | 187 |
| 189 | |
Other editions - View all
Identity Management: Concepts, Technologies, and Systems Elisa Bertino,Kenji Takahashi No preview available - 2011 |
Common terms and phrases
3GPP access control anonymized applications approach assurance levels attacks authentication events authentication methods Bertino biometric browser client cloud computing communication context defined different identity digital certificates digital credentials digital identity management discussed encryption example Facebook federated identity Figure IC-IDM iden identity artifacts identity attributes identity credentials identity data identity federation identity information identity management solutions identity providers identity selector identity theft identity transactions IdPs and RPs IEEE implemented individuals information card interactions Internet interoperability issued Kantara Initiative Kerberos Liberty Alliance multifactor multifactor authentication OASIS Security OpenID OpenID Foundation OpenID identifier organization P-RBAC password phishing privacy policies privacy-preserving protection proxy certificate pseudonym public key RBAC Red RP redirection relying parties require SAML assertions SAML protocol security token server service providers single sign-on social networks standards Step techniques technologies ticket tion trust unlinkability usability usernames verify Web browser White IdP WS-Trust XACML


