Emerging Frameworks in User-Focused Identity Management

Emerging Frameworks in User-Focused Identity Management

Manish Gupta (State University of New York, USA) and Raj Sharman (State University of New York, USA)
Copyright: © 2009 |Pages: 16
DOI: 10.4018/978-1-59904-859-8.ch026
OnDemand PDF Download:


A paradigm shift is occurring in identity management philosophy. User-focused identity management is one the emerging and most promising paradigms. One of the fundamental principles of the user-focused identity management frameworks is that the users control their identity formations, revelations, and interactions. This means that users must be given the choice of which identities to use at which services; they have choice to decide what identity information will be disclosed to services and how those services will use their identity information. User-focused identity management frameworks are posed to make users’ online interactions easier and safer. In this chapter, we survey 11 of the most common user-focused identity management frameworks that are emerging, and their associated technologies. First, the chapter discusses issues and challenges with domain-centric identity management paradigm and presents unique value propositions of user-focused frameworks. Secondly, this chapter provides a comprehensive and cohesive coverage of common user-focused identity management frameworks. Users, technologists, businesses; and systems and security managers will gain a comprehensive understanding of the concepts, frameworks and associated technologies relating to user-focused identity management.
Chapter Preview


Digital identities come in all shapes and sizes. Usually people use different digital identities in different contexts depending on association of different information with each identity. For example, an identity that we use with a online retailer will allow access to personal information such as credit card information, shipping information, purchasing history and personalized recommendations, the one used with social networking sites such as orkut.com does not. There are different methods and protocols to create new identities depending on context and user preferences. Insecure identity management has led to severe consequences. Recent research (Javelin, 2007) shows that the number of US is 8.4 million in 2007 and total one-year fraud amount is $49.3 billion in 2007.

Identity is a collection of unique characteristics of an entity which are either inherent or are assigned by another entity (Pfitzmann and Waidner, 2004). A digital identity comprises electronic records that represent network principals, including people, machines, and services (Windley, 2005; March, 2003). To be able to create, maintain and use digital identities the deployment of a digital identity management system is required. The term “identity management” (Casassa, 2003) is currently associated with technologies and solutions, mainly deployed within enterprises, to deal with the storage, processing, disclosure and disposal of users’ identities, their profiles and related sensitive information. This infrastructure uses identities in the process of authentication and maps identifiers to the information needed for identification and authorization (Buell and Sandhu, 2003; Pfitzmann and Waidner, 2004). Identity Management covers the spectrum of tools and processes that are used to represent and administer digital identities and manage access for those identities (Allan et al., 2008). The three main business drivers for identity management solutions are security efficiency (lower costs and improved service), security effectiveness (including regulatory compliance) and business agility and performance (including workforce effectiveness and customer convenience) (Allan et al., 2008).

Identity Management is a means to reduce such risks, representing a vital part of a company’s security and auditing infrastructure ((Buell and Sandhu, 2003). The secure and efficient administration of numerous personal attributes that make up digital identities is one of the key requirements in open and closed networks. Especially in respect to confidentiality and integrity, the users themselves, rather than popular external threads like viruses, phishing, or pharming attacks represent the main risk (Stanton et al, 2005). As a result of incorrect account management and inadequately enforced security policies users accumulate a number of excessive rights within the organizations’ IT systems over time, violating the principle of the least privilege (Ferraiolo et al., 2003). Moreover, people have a hectic life and cannot spend their time administering their digital identities (El Maliki and Seigneur, 2007). Identity Management in open networks like the Internet has received tremendous attention throughout the last years with researchers. Although considered important, Identity Management in closed networks, however, has not gained comparable significance within the research community.

Key Terms in this Chapter

EXtensible Resource Identifier (XRI): is a scheme and resolution protocol for abstract identifiers compatible with Uniform Resource Identifiers and Internationalized Resource Identifiers, developed by the XRI Technical Committee at OASIS.

Yadis: Yadis is a Communications protocol for discovery of digital identity authentication services, such as OpenID, and related data sharing services.

Microsoft Cardspace: Microsoft CardSpace is the name for a new technology in Microsoft .NET Framework 3.0 that simplifies and improves the safety of accessing resources and sharing personal information on the Internet.

SXIP: SXIP is a platform based on a fully decentralized architecture providing an open and simple set of processes to exchange identity information.

Shibboleth: The Shibboleth System is a standards-based, open source software package for web single sign-on.

Identity Management (IDM): Identity Management comprises technologies and solutions employed for provisioning, maintaining and terminating users’ identities, their profiles and related sensitive information.

User-Focused IDM: User-focused Identity Management frameworks are architectural constructs and technical components that are intended to provide users with control of their identity attributes when registering and accessing online services.

OpenID: OpenID is a shared identity service, which allows Internet users to log on to different web sites using a single digital identity, eliminating the need for a multiple user names and passwords.

Complete Chapter List

Search this Book:
Editorial Advisory Board
Table of Contents
Jatinder N. D. Gupta, Sushil Sharma, Mohammad A. Rashid
Jatinder N. D. Gupta, Sushil Sharma, Mohammad A. Rashid
Chapter 1
Nancy Alexopoulou, Panagiotis Kanellis, Mara Nikolaidou, Drakoulis Martakos
Efficient response to change, both upon expected and unpredicted contingencies, is a critical characteristic for modern enterprises. This chapter... Sample PDF
A Holistic Approach for Enterprise Agility
Chapter 2
Hossana H. Aberra
SAP Business Blueprint is a vital part of SAP implementation exercise. A well-defined business blueprint may set the foundation for successful... Sample PDF
What is SAP Business Blueprint?
Chapter 3
Rogerio Atem de Carvalho
This chapter introduces the key aspects of Free/Open Source Enterprise Resources Planning systems (FOS-ERP). Starting by related work carried out by... Sample PDF
Free and Open Source Enterprise Resources Planning
Chapter 4
Brian H. Cameron
Business process modeling (BPM) is a topic that is generating much interest in the information technology (IT) industry today. Business analysts... Sample PDF
The Changing Nature of Business Process Modeling: Implications for Enterprise Systems Integration
Chapter 5
Alok Mishra
In the age of globalization, organizations all over the world are giving more significance to strategy and planning to get an edge in the... Sample PDF
Enterprise Resource Planning Systems: Effects and Strategic Perspectives in Organizations
Chapter 6
Gary P. Moynihan
An executive information system (EIS) is a software system designed to support the informational needs of senior management. The EIS is... Sample PDF
An Overview of Executive Information Systems
Chapter 7
Joseph Bradley
Enterprise Resource Planning systems have proven difficult and costly to implement. Organizations must consider the risks and rewards of embarking... Sample PDF
Enterprise Resource Planning System Risks and Rewards
Chapter 8
Andrea Masini
After observing that the pervasiveness of IT may soon render it strategically irrelevant, management scholars have recently questioned the value of... Sample PDF
ERP-Driven Performance Changes and Process Isomorphism
Chapter 9
Ronda R. Henning
The application software life cycle considers the functionality of a given collection of components within the context of a consumer’s requirements... Sample PDF
Application Integration within the Enterprise Context
Chapter 10
Sanjay Mathrani, Mohammad A. Rashid, Dennis Viehland
A significant investment in resources is required for implementation of integrated enterprise systems as technology solutions while the... Sample PDF
The Impact of Enterprise Systems on Business Value
Chapter 11
Charlotte H. Mason, Aleda V. Roth
Growing competitive pressures and escalating customer demands have led businesses to sophisticated information technology to manage costs and... Sample PDF
The Right Path to SCM-CRM Integration
Chapter 12
Euripidis Loukis, Ioakim Sapounas, Konstantinos Aivalis
This chapter is dealing with the alignment of enterprise systems with business strategy and its impact on the business value that enterprise systems... Sample PDF
Enterprise Systems Strategic Alignment and Business Value
Chapter 13
Sanjay Mathrani, Mohammad A. Rashid, Dennis Viehland
The market for enterprise systems (ES), continues to grow in the post millennium era as businesses become increasingly global, highly competitive... Sample PDF
Enterprise Systems in Small and Medium-Sized Enterprises
Chapter 14
Kerstin Fink, Christian Ploder
Small and medium-sized enterprises (SMEs) are a vital and growing part of any national economy. Like most large businesses, SMEs have recognized the... Sample PDF
Integration Concept for Knowledge Processes, Methods, and Software for SMEs
Chapter 15
Tobias Schoenherr, Ditmar Hilpert, Ashok K. Soni, M.A. Venkataramanan, Vincent A. Mabert
Although the research on integrated enterprise systems (ES) is proliferating, the knowledge base about ES implementations, usage and experiences... Sample PDF
Enterprise System in the German Manufacturing Mittelstand
Chapter 16
Darshana Sedera
Organizations invest substantial resources in acquiring Enterprise Systems, presumably expecting positive impacts to the organization and its... Sample PDF
Size Matters! Enterprise System Success in Medium and Large Organizations
Chapter 17
Joseph Bradley
ERP implementation projects normally involve a single vendor providing the packaged software for the entire system. Although most companies follow... Sample PDF
Implementing Best of Breed ERP Systems
Chapter 18
Ganesh Vaidyanathan
Enterprise resource planning systems are complex yet single, integrated software programs that runs off a single database so that the various... Sample PDF
Enterprise Resource Systems Software Implementation
Chapter 19
Calin Gurau
This chapter considers the importance of business modelling for implementing e-CRM systems. The introduction of e-business models requires the... Sample PDF
Restructuring the Marketing Information System for eCRM: An Application of the Eriksson-Penker Method
Chapter 20
Albert Boonstra
At the present moment, many hospitals are going through a process of change directed at the integrated delivery of health care. Enterprise Systems... Sample PDF
Analyzing an ES Implementation in a Health Care Environment
Chapter 21
S. Padmanaban
ERP systems have become key enablers of businesses today. While many organizations wish to adopt ERP for competitive advantage, they find choosing... Sample PDF
Designing to Deploying Customisable ERP Cost Effectively
Chapter 22
Mateja Podlogar, Katalin Ternai
This chapter introduces the ERP systems, their complexity, and especially their integration in higher education as a significant challenge for many... Sample PDF
ERP Systems in Higher Education from Regional Perspective
Chapter 23
Valentin Nicolescu, Holger Wittges, Helmut Krcmar
This chapter provides an overview of past and present development in technical platforms of ERP systems and its use in enterprises. Taking into... Sample PDF
From ERP to Enterprise Service-Oriented Architecture
Chapter 24
ERP and Beyond  (pages 329-345)
Suresh Subramoniam, Mohamed Tounsi, Shehzad Khalid Ghani, K. V. Krishnankutty
Enterprise-wide automation has already transformed the relations among suppliers, purchasers, producers, and customers. Conventional ERP helps only... Sample PDF
ERP and Beyond
Chapter 25
Gita A. Kumta
The chapter introduces the essence of ERP in government as a tool for integration of government functions which provides the basis for citizen... Sample PDF
E-Government and ERP: Challenges and Strategies
Chapter 26
Manish Gupta, Raj Sharman
A paradigm shift is occurring in identity management philosophy. User-focused identity management is one the emerging and most promising paradigms.... Sample PDF
Emerging Frameworks in User-Focused Identity Management
Chapter 27
Ramón Brena, Gabriel Valerio, Jose-Luis Aguirre
From the Knowledge Management perspective, Knowledge distribution is a critical process in organizations. As many of the other Knowledge-related... Sample PDF
Next-Generation IT for Knowledge Distribution in Enterprises
About the Editors
About the Contributors