IMC: A Classification of Identity Management Approaches
Titel Sammlung:
Computer Security
Untertitel Sammlung:
ESORICS 2020 International Workshops, DETIPS, DeSECSys, MPS, and SPOSE, Guildford, UK, September 17–18, 2020, Revised Selected Papers
Herausgeber Sammlung:
Boureanu, Ioana ; Drăgan, Constantin Cătălin ; Manulis, Mark ; Giannetsos, Thanassis ; Dadoyan, Christoforos ; Gouvas, Panagiotis ; Hallman, Roger A. ; Li, Shujun; Chang, Victor ; Pallas, Frank ; Pohle, Jörg ; Sasse, Angela
Reihentitel:
Lecture Notes in Computer Science, LNCS
Bandnummer Reihe:
12580
Konferenztitel:
Interdisciplinary Workshop on Trust, Identity, Privacy, and Security in the Digital Economy (2020, Guildford)
Konferenztitel:
DETIPS
Tagungsort:
Guildford
Jahr der Konferenz:
2020
Datum Beginn der Konferenz:
17.09.2020
Datum Ende der Konferenz:
18.09.2020
Verlagsort:
Cham
Verlag:
Springer International Publishing
Jahr:
2020
Seiten von - bis:
3-20
Sprache:
Englisch
Abstract:
This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, describing characteristics of cooperation. The morphology is then mapped to the life cycle of users and identity management in a further step. These classifications are practically underlined with current approaches. Both methods combined provide a comprehensive characterization of identity management approaches. The methods help to choose suited approaches and implement needed tools. «
This paper presents a comprehensive classification of identity management approaches. The classification makes use of three axes: topology, type of user, and type of environment. The analysis of existing approaches using the resulting identity management cube (IMC) highlights the trade-off between user control and trust in attributes. A comparative analysis of IMC and established models identifies missing links between the approaches. The IMC is extended by a morphology of identity management, d... »