IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Identity Assurance in Open Networks

Identity Assurance in Open Networks
View Sample PDF
Author(s): Ivonne Thomas (Hasso-Plattner-Institute, Germany)and Christoph Meinel (Hasso-Plattner-Institute, Germany)
Copyright: 2012
Pages: 19
Source title: Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
Source Author(s)/Editor(s): Manish Gupta (State University of New York at Buffalo, USA), John Walp (M&T Bank Corporation, USA)and Raj Sharman (State University of New York, USA)
DOI: 10.4018/978-1-4666-0197-0.ch003

Purchase

View Identity Assurance in Open Networks on the publisher's website for pricing and purchasing information.

Abstract

Identity assurance is the degree of confidence another party, such as a service provider, can have in the belief that identity in the digital world actually matches with “real-life” identity. In open networks, establishing this confidence is not an easy task as participants are often located in different trust domains. Moreover, with the spread of open identity management systems, identity information is often held by designated identity provisioning services, so called identity providers. If another party shall be enabled to rely on received information, it ought to know how much confidence it can put into the assertions of the sender. In the intent to create a global standard, governments, commercial organizations, and academia alike have published common guidelines for identity assurance as part of so-called identity assurance frameworks. This chapter provides a state-of-the-art overview of identity assurance frameworks and describes them along important trust factors of identity providers. Furthermore, limitations of identity assurance frameworks are identified and highlighted as potential fields for further research. As an outlook to future developments, a small case study is presented that introduces trust levels for attributes in order to enable a service provider to distinguish between different qualities of trust, thus providing more flexibility in the way identity assurance is achieved in open networks.

Related Content

Chaymaâ Boutahiri, Ayoub Nouaiti, Aziz Bouazi, Abdallah Marhraoui Hsaini. © 2024. 14 pages.
Imane Cheikh, Khaoula Oulidi Omali, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 30 pages.
Tahiri Omar, Herrou Brahim, Sekkat Souhail, Khadiri Hassan. © 2024. 19 pages.
Sekkat Souhail, Ibtissam El Hassani, Anass Cherrafi. © 2024. 14 pages.
Meryeme Bououchma, Brahim Herrou. © 2024. 14 pages.
Touria Jdid, Idriss Chana, Aziz Bouazi, Mohammed Nabil Kabbaj, Mohammed Benbrahim. © 2024. 16 pages.
Houda Bentarki, Abdelkader Makhoute, Tőkési Karoly. © 2024. 10 pages.
Body Bottom