Reference Hub1
Identity Assurance in Open Networks

Identity Assurance in Open Networks

Ivonne Thomas, Christoph Meinel
ISBN13: 9781466601970|ISBN10: 1466601973|EISBN13: 9781466601987
DOI: 10.4018/978-1-4666-0197-0.ch003
Cite Chapter Cite Chapter

MLA

Thomas, Ivonne, and Christoph Meinel. "Identity Assurance in Open Networks." Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, edited by Manish Gupta, et al., IGI Global, 2012, pp. 34-52. https://doi.org/10.4018/978-1-4666-0197-0.ch003

APA

Thomas, I. & Meinel, C. (2012). Identity Assurance in Open Networks. In M. Gupta, J. Walp, & R. Sharman (Eds.), Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions (pp. 34-52). IGI Global. https://doi.org/10.4018/978-1-4666-0197-0.ch003

Chicago

Thomas, Ivonne, and Christoph Meinel. "Identity Assurance in Open Networks." In Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, edited by Manish Gupta, John Walp, and Raj Sharman, 34-52. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-0197-0.ch003

Export Reference

Mendeley
Favorite

Abstract

Identity assurance is the degree of confidence another party, such as a service provider, can have in the belief that identity in the digital world actually matches with “real-life” identity. In open networks, establishing this confidence is not an easy task as participants are often located in different trust domains. Moreover, with the spread of open identity management systems, identity information is often held by designated identity provisioning services, so called identity providers. If another party shall be enabled to rely on received information, it ought to know how much confidence it can put into the assertions of the sender. In the intent to create a global standard, governments, commercial organizations, and academia alike have published common guidelines for identity assurance as part of so-called identity assurance frameworks. This chapter provides a state-of-the-art overview of identity assurance frameworks and describes them along important trust factors of identity providers. Furthermore, limitations of identity assurance frameworks are identified and highlighted as potential fields for further research. As an outlook to future developments, a small case study is presented that introduces trust levels for attributes in order to enable a service provider to distinguish between different qualities of trust, thus providing more flexibility in the way identity assurance is achieved in open networks.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.