From Domain-Based Identity Management Systems to Open Identity Management Models

From Domain-Based Identity Management Systems to Open Identity Management Models

Ivonne Thomas, Christoph Meinel
ISBN13: 9781613504987|ISBN10: 1613504985|EISBN13: 9781613504994
DOI: 10.4018/978-1-61350-498-7.ch002
Cite Chapter Cite Chapter

MLA

Thomas, Ivonne, and Christoph Meinel. "From Domain-Based Identity Management Systems to Open Identity Management Models." Digital Identity and Access Management: Technologies and Frameworks, edited by Raj Sharman, et al., IGI Global, 2012, pp. 19-38. https://doi.org/10.4018/978-1-61350-498-7.ch002

APA

Thomas, I. & Meinel, C. (2012). From Domain-Based Identity Management Systems to Open Identity Management Models. In R. Sharman, S. Das Smith, & M. Gupta (Eds.), Digital Identity and Access Management: Technologies and Frameworks (pp. 19-38). IGI Global. https://doi.org/10.4018/978-1-61350-498-7.ch002

Chicago

Thomas, Ivonne, and Christoph Meinel. "From Domain-Based Identity Management Systems to Open Identity Management Models." In Digital Identity and Access Management: Technologies and Frameworks, edited by Raj Sharman, Sanjukta Das Smith, and Manish Gupta, 19-38. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-61350-498-7.ch002

Export Reference

Mendeley
Favorite

Abstract

One of the main reasons is the problem of establishing trust relationships between independent parties—a problem inherent to open environments with multiple trust domains. In open environments, participants often do not know each other, but nevertheless require an existing trust relationship to perform critical transactions. Governments, commercial organizations, and academia alike have addressed this issue by providing better assurance guidelines for identity management. The outcome is a number of identity assurance frameworks that identify and cluster certain security criteria into levels of trust or levels of assurance (LoA). These approaches are described, compared, and assessed with regard to their role towards a reliable identity management across the Internet. Limitations are identified and trust levels for attributes are proposed as potential fields for further research.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.