Identity Management and Trust Negotiation - PowerPoint PPT Presentation

1 / 10
About This Presentation
Title:

Identity Management and Trust Negotiation

Description:

The environment which allows digital identities to validate in order to exchange ... Duncan A. Buell and Ravi Sandhu. ' Identity Management. ... – PowerPoint PPT presentation

Number of Views:24
Avg rating:3.0/5.0
Slides: 11
Provided by: thenn
Category:

less

Transcript and Presenter's Notes

Title: Identity Management and Trust Negotiation


1
Identity Management and Trust Negotiation
  • Controlling the Release of Identity Information

By Timothy Hennebry Advisor Jami Montgomery
2
Identity management
  • The environment which allows digital identities
    to validate in order to exchange information.
  • Includes the definition and lifecycle management
    of the digital identities and profiles.

3
Digital identities
  • Consist of two concepts
  • Nyms - allow the use of different identities when
    interacting with other parties in diverse
    environments.
  • Partial identities - are made up of properties,
    associated with the user, to create a profile.

4
Trust Negotiation
  • Access control that is granted based on a trust
    established in a negotiation between the service
    requester and the service provider.
  • During communications between the requester and
    provider, credentials are exchanged iteratively
    to build a trust negotiation
  • The credentials that are exchanged encompass
    signed assertions that describe the owners
    attributes

5
Trust Negotiation Example
6
Open Issues
  • Identity management
  • How to prevent cases in which an identity is
    released but no service is given in return.
  • How to control identity information that is
    stored in databases.
  • A need for negotiation protocols that enable
    parties to determine which identity information
    to release to their counterparts.

7
Open Issues (cont.)
  • Trust Negotiation
  • Specifying trust negotiation policies still
    requires time-consuming hand coding and low level
    programming due to the fact that policy
    specification and enforcement is not clearly
    separated. Policy enforcement often requires ad
    hoc implementations that do not scale well.

8
Research Information
  • Website http//home.comcast.net/trhennebry/
  • Email trhennebry_at_comcast.net

9
Questions?
10
Resources
  • Duncan A. Buell and Ravi Sandhu. Identity
    Management. IEEE Internet Computing Online Vol.
    7 No. 6, November - December 2003, 1 March 2005
    http//csdl.computer.org/comp/mags/ic/2003/06/w602
    6.pdf
  • Ernesto Damiani, Sabrina De Capitani di Vimercati
    and Pierangela Samarati. Managing Multiple and
    Dependable Identities. IEEE Internet Computing
    Online Vol. 7 No. 6, November - December 2003, 1
    March 2005 http//csdl.computer.org/dl/mags/ic/200
    3/06/w6029.pdf
  • Halvard Skogsrud, Boualem Benatallah and Fabio
    Casati. Model-Driven Trust Negotiation for Web
    Services. IEEE Internet Computing Online Vol. 7
    No. 6, November - December 2003, 1 March 2005
    http//csdl2.computer.org/dl/mags/ic/2003/06/w6045
    .pdf
Write a Comment
User Comments (0)
About PowerShow.com