635 research outputs found

    OpenID as an Approach for User-centric Identity Management

    Get PDF
    Nowadays, users are confronted with a number of different passwords and accounts in the Internet, resulting in a complex and time-consuming identity management. OpenID as an approach for a user-centric identity management is supposed to reduce the user’s effort. This paper analyses how OpenID can be used as an identity management solution in the Internet and to what extent it matches the idea of a user-centric identity. On the basis of a study, we show general limitations of OpenID and specific challenges regarding the user-centricity. At the end, we point out open research questions and further developments in this area

    Layered identity infrastructure model for identity meta systems

    Get PDF
    There are several Identity Meta Systems emerging in the identity management field, such as CardSpace and Higgins Trust Framework. The goal of an Identity Meta System (IMetS) is to integrate existing or new Identity Management System (IMS) to provide users with seamless interoperability and a consistent user experience. IMetS is a complex system that tries to integrate the already complicated IMS services. With such a complex system, we need a way to assess IMetS in order to determine how well an IMetS integrates the various IMS services. However, as IMetS is a rela- tively new concept, there is no framework to identify the properties that an ideal IMetS should have. The contribution of this paper is to introduce the Layered Identity Infrastructure Model (LIIM) that can be used as a framework to assess IMetS. In addition, the LIIM framework can also be used to identify the missing components of an IMetS, to guide and improve the design of an existing IMetS, to serve as a design benchmark for a new IMetS, as well as to aid the understanding of a complicated IMetS

    Emergent Capabilities for Collaborative Teams in the Evolving Web Environment

    No full text
    This paper reports on our investigation of the latest advances for the Social Web, Web 2.0 and the Linked Data Web. These advances are discussed in terms of the latest capabilities that are available (or being made available) on the Web at the time of writing this paper. Such capabilities can be of significant benefit to teams, especially those comprised of multinational, geographically-dispersed team members. The specific context of coalition members in a rapidly formed diverse military context such as disaster relief or humanitarian aid is considered, where close working between non-government organisations and non-military teams will help to achieve results as quickly and efficiently as possible. The heterogeneity one finds in such teams, coupled with a lack of dedicated private network infrastructure, poses a number of challenges for collaboration, and the current paper represents an attempt to assess whether nascent Web-based capabilities can support such teams in terms of both their collaborative activities and their access to (and sharing of) information resources

    An Analysis of User-Centric Identity Technology Trends, Openid\u27s First Act

    Get PDF
    Identity technologies within Internet applications have evolved at an aggressive pace over the past decade. As a result, a variety of user-centric identity management technologies are available on the Internet today. The user-centric identity technology realm has become a fragmented ecosystem of standards, techniques, and technical approaches to identity management. A symptom of this fragmentation is the sluggish adoption of user-centric identity technologies by Internet users. A study titled, An Analysis of User-Centric Identity Technology Trends, OpenID â„¢s First Act, aims to reveal identity technology adoption patterns of users that engage in the use of Internet applications secured by an authentication credential. The study specifically focuses on Internet applications currently offering, or having at some point in time offered OpenID 1.x/2.0 (denoted OpenID hereafter), also known as OpenID â„¢s First Act. An extensive history of OpenID, from its inception as an emerging technology, to its declining rate of adoption as a standard for Internet single-sign-on, will be presented. A goal of this critical analysis is to reveal the shortcomings of OpenID that led to the discontinuation of the technology by prominent Internet applications. In support of this critical analysis, a survey is conducted which gauges the awareness of OpenID among casual Internet users. The results from this survey will be compared with observed trends among Internet applications to determine the contributing factors to OpenID â„¢s decline on the Internet and the subsequent efforts to reinvent the technology
    • …
    corecore