Abstract
The National Strategy for Trusted Identities in Cyberspace represents a shift in the way the U.S. government is approaching identity management, privacy, and the Internet.
- Diffie, W. and Hellman, M. New directions in cryptography. IEEE Transactions on Information Theory IT-22, 6 (Nov. 1976), 644--654.Google ScholarDigital Library
- Johnson, D. R., Crawford, S. P., and Palfrey, J. G. The accountable Net: Peer production of Internet governance. Berkman Center for Internet & Society at Harvard Law School Virginia Journal of Law and Technology 9, 9 (2004); http://ssrn.com/abstract=529022 or DOI:10.2139/ssrn.529022.Google Scholar
Index Terms
- Identity management and privacy: a rare opportunity to get it right
Recommendations
Achieving Privacy in a Federated Identity Management System
Financial Cryptography and Data SecurityFederated identity management allows a user to efficiently authenticate and use identity information from data distributed across multiple domains. The sharing of data across domains blurs security boundaries and potentially creates privacy risks. We ...
Enhancing privacy in identity management systems
WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic societyUser-privacy in existing identity management systems (IMS) can be improved.Indeed, private credential systems offer privacy enhancing capabilities not yet included in current IMS; e.g. proving claims such as age > 18, with age an attribute. This paper ...
Criteria for Evaluating the Privacy Protection Level of Identity Management Services
SECURWARE '09: Proceedings of the 2009 Third International Conference on Emerging Security Information, Systems and TechnologiesIdentity Management is the one of web services that manages the digital identity and the personally identifiable information of the user who subscribed for various web services in Internet. It was developed to provide user with an easy way to use and ...
Comments