IMC: A Classification of Identity Management Approaches
Collection title:
Computer Security
Collection subtitle:
ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers
Collection editors:
Boureanu, Ioana ; Drăgan, Constantin Cătălin ; Manulis, Mark ; Giannetsos, Thanassis ; Dadoyan, Christoforos ; Gouvas, Panagiotis ; Hallman, Roger A. ; Li, Shujun; Chang, Victor ; Pallas, Frank ; Pohle, Jörg ; Sasse, Angela
Series title:
Lecture Notes in Computer Science, LNCS
Series volume:
12580
Conference title:
Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (2020, Guildford)
Conference title:
DETIPS
Venue:
Guildford
Year of conference:
2020
Date of conference beginning:
17.09.2020
Date of conference ending:
18.09.2020
Place of publication:
Cham
Publisher:
Springer International Publishing
Year:
2020
Pages from - to:
3-20
Language:
Englisch
Abstract:
This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, describing characteristics of cooperation. The morphology is then mapped to the life cycle of users and identity management in a further step. These classifications are practically underlined with current approaches. Both methods combined provide a comprehensive characterization of identity management approaches. The methods help to choose suited approaches and implement needed tools. «
This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, d... »