[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2304656.2304659acmconferencesArticle/Chapter ViewAbstractPublication PagescomparchConference Proceedingsconference-collections
research-article

Evaluating identity management architectures

Published: 25 June 2012 Publication History

Abstract

Developments in the area of identity management have been subject to very little critique. Many implementations have gathered little general following, and larger scale adoption, such as OpenID, has been limited to internal systems and large identity providers.
Previous evaluation has focussed on specific areas and does little to describe the trade off performed in the use of new identity management architectures. Furthermore, these evaluations have not equally considered user vs service provider perspective. This paper looks to derive a method for evaluation which encapsulates metrics from past work and areas which have not been considered. This method produces a holistic evaluation and comparison of identity management architectures.

References

[1]
Carolyn Axtell, Donald Hislop, and Steve Whittaker. Mobile technologies in mobile spaces: Findings from the context of train travel. International Journal of Human-Computer Studies, 66(12):902 -- 915, 2008. Mobile human-computer interaction.
[2]
Endre Bangerter, Jan Camenisch, and Anna Lysyanskaya. A cryptographic framework for the controlled release of certified data. In Security Protocols, Lecture Notes in Computer Science, pages 20--42. Springer Berlin / Heidelberg, 2006.
[3]
Marc Barisch. Design and evaluation of an architecture for ubiquitous user authentication based on identity management systems. In 10th IEEE Trust, Security and Privacy in Computing and Communications (TrustCom), pages 863--872. IEEE, 2011.
[4]
Ali N. Haidar and Ali E. Abdallah. Comparison and evaluation of identity management in three architectures for virtual organizations. In Proceedings of the 2008 The Fourth International Conference on Information Assurance and Security, pages 21--26, Washington, DC, USA, 2008. IEEE Computer Society.
[5]
Cormac Herley and Paul C. van Oorschot. A research agenda acknowledging the persistence of passwords. Security & Privacy, IEEE, (99).
[6]
Rick Kazman, Mario Barbacci, Mark Klein, S. Jeromy Carrière, and Steven G. Woods. Experience with performing architecture tradeoff analysis. Software Engineering, International Conference on, 0:54, 1999.
[7]
Aram Khalili, Jonathan Katz, and William A. Arbaugh. Toward secure key distribution in truly ad-hoc networks. In Applications and the Internet Workshops, 2003. Proceedings. 2003 Symposium on, pages 342--346, Jan. 2003.
[8]
Barbara Kitchenham. Procedures for performing systematic reviews. Technical Report TR/SE-0401, Keele University Technical Report, July 2004.
[9]
Jim Miller. One more take on identity. IEEE Internet Computing, 13(2):99--101, 2009.
[10]
Birgit Pfitzmann and Michael Waidner. Privacy in browser-based attribute exchange. In WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pages 52--62, New York, NY, USA, 2002. ACM.
[11]
Thomas L. Saaty. How to make a decision: the analytic hierarchy process. European journal of operational research, 48(1):9--26, 1990.
[12]
Frank Schell, Andreas Schaf, Jochen Dinger, and Hannes Hartenstein. Assessing identity and access management systems based on domain-specific performance evaluation. In Proceedings of the first joint WOSP/SIPEW international conference on Performance engineering, WOSP/SIPEW '10, pages 253--254, New York, NY, USA, 2010. ACM.
[13]
Suriadi Suriadi, Ernest Foo, and Rong Du. Layered identity infrastructure model for identity meta systems. In AISC '08: Proceedings of the sixth Australasian conference on Information security, pages 83--92, Darlinghurst, Australia, 2008. Australian Computer Society, Inc.

Cited By

View all
  • (2020)IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT DevicesSensors10.3390/s2022654620:22(6546)Online publication date: 16-Nov-2020

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ISARCS '12: Proceedings of the 3rd international ACM SIGSOFT symposium on Architecting Critical Systems
June 2012
80 pages
ISBN:9781450313476
DOI:10.1145/2304656
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 June 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. architecture
  2. evaluation
  3. identity management
  4. security

Qualifiers

  • Research-article

Conference

Comparch '12
Sponsor:

Acceptance Rates

ISARCS '12 Paper Acceptance Rate 7 of 18 submissions, 39%;
Overall Acceptance Rate 14 of 30 submissions, 47%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2020)IMSC-EIoTD: Identity Management and Secure Communication for Edge IoT DevicesSensors10.3390/s2022654620:22(6546)Online publication date: 16-Nov-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media