Browse > Article
http://dx.doi.org/10.6109/jkiice.2012.16.10.2199

A Dynamic Trust Framework for Sharing Identity Authentication  

Park, Seung-Chul (한국기술교육대학교)
Abstract
Identity authentication sharing technology which allows many service providers to share the result of identity authentication of an identity provider provides several important advantages including high usability achieved by avoiding repeated registration of identity information to service providers and single sign-on, cost effectiveness of service providers achieved by outsourcing identity authentication services from identity providers, and privacy protection achieved by exposing identity information only to a limited number of controlled identity providers. However, in order for the identity authentication sharing technologies to be widely deployed in global Internet scale, the trustworthiness issue among the participating identity providers, service providers, and users should be resolved in advance. This paper firstly analyzes existing trust frameworks for identity authentication sharing. And then, based on the result of analysis, this paper proposes a dynamic and open trust framework for identity authentication sharing.
Keywords
identity management; authentication sharing; authentication assurance; trust framework;
Citations & Related Records
연도 인용수 순위
  • Reference
1 A. Josang and S. Pope, "User Centric Identity Management", AusCERT Conference, pp. 77-89, May 2005.
2 FIDIS, "D3.17:identity Management Systems - recent developments", www.fidis.net, August 2009.
3 J. A. Grant, "The National Strategy for Trusted Identities in Cyberspace", IEEE Internet Computing, pp. 80-84, November/December 2011.
4 OpenID Foundation, "OpenID Authentication 2.0 - Final", http://openid.net/specs/openid-authentication-2_0.html, Dec. 2007.
5 Craig Burton, "The Information Card Ecosystem: The Fundamental Leap from Cookies & Passwords to Cards & Selectors", ICF(http://www.informationcard.net), April 2009.
6 OASIS, "Identity Metasystem Interoperability Version 1.0", http://docs.oasis-open.org/imi/ns/identity/v1.0/identity.html, May 2009.
7 OASIS, "Security Assertion Markup Language (SAML) V2.0 Technical Overview", http://www.oasis-open.org, March 2008.
8 T. E. Maliki and J.-M. Seigneur, "A Survey of User-centric Identity Management Technologies", Proc. of Int'l Conference on Emerging Security Information, Systems and Technologies, pp. 12-17, 2007.
9 E. Maler and D. Reed, "The Venn of Identity - Options and Issues in Federated Identity Management", IEEE Security & Privacy, pp. 16-23, March/April 2008.
10 D. P. Korman and A. D. Rubin, "Risks of the Passport Single Signon Protocol", IEEE Computer Networks, Vo. 33, pp. 51-58, July 2000.   DOI   ScienceOn
11 http://en.wikipedia.org/wiki/Windows_Live_ID
12 Liberty Alliance Project, "Liberty ID-FF Architecture Overview", Liberty Alliance, 2004.
13 http://www.projectliberty.org/
14 http://www.oasis-open.org/committees/security/
15 http://incommon.org/
16 http://openidentityexchange.org/
17 D. Thibeau and D. Reed, "Open Trust Frameworks for Open Government : Enabling Citizen Involvement through Open Identity Technologies", http://openid.net/, Aug. 2009.
18 M. Rundle, et. al., "The Open Identity Trust Framework(OITF) Model", http://openidentityexchange/, March 2010.
19 http://kantarainitiative.org/