You are previewing Digital Identity and Access Management.
O'Reilly logo
Digital Identity and Access Management

Book Description

Digital identity and access management (DIAM) systems are essential to security frameworks for their ability to rapidly and consistently confirm identities and to control individuals’ access to resources and services. However, administering digital identities and system access rights can be challenging even under stable conditions. Digital Identity and Access Management: Technologies and Frameworks explores important and emerging advancements in DIAM systems. The book helps researchers and practitioners in digital identity management to generate innovative answers to an assortment of problems, as system managers are faced with major organizational, economic and market changes and are also expected to increase reach and ease of access to users across cyberspace while guaranteeing the reliability and privacy of highly sensitive data.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. LIST OF REVIEWERS
  5. Preface
    1. PRIMARY CHALLENGES OF DIAM
    2. OVERVIEW OF CHAPTERS IN THE BOOK
  6. Chapter 1: IAM Risks during Organizational Change and Other Forms of Major Upheaval
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. SOME ISSUES AND DEFINITIONS
    5. USER ATTITUDES IN GROWTH AND CONTRACTION SCENARIOS
    6. ORGANIZATIONAL STRUCTURES AND IAM FUNCTIONS
    7. SOME CASES
    8. LESSONS LEARNED
    9. FUTURE RESEARCH DIRECTIONS
    10. CONCLUSION
  7. Chapter 2: From Domain-Based Identity Management Systems to Open Identity Management Models
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND - IDENTITY MANAGEMENT: DEFINITION AND APPROACHES
    4. CLASSIFICATION OF IDENTITY MANAGEMENT
    5. OPEN IDENTITY MANAGEMENT STANDARDS AND TECHNOLOGIES
    6. TOWARDS IDENTITY ASSURANCE IN OPEN IDENTITY MANAGEMENT SYSTEMS
    7. FUTURE RESEARCH DIRECTIONS: TRUST LEVELS FOR ATTRIBUTES
    8. CONCLUSION
  8. Chapter 3: Effective Guidelines for Facilitating Construction of Successful, Advanced, User-Centric IAM Frameworks
    1. ABSTRACT
    2. INTRODUCTION
    3. DEFINITIONS, IAM MODELS AND RELATED WORK
    4. A NOVEL IAM FRAMEWORK APPROACH
    5. CRITICAL SUCCESS FACTORS FOR BUILDING IAM FRAMEWORKS
    6. CONCLUSION AND FURTHER WORK
  9. Chapter 4: Feasibility and Sustainability Model for Identity Management
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MAIN FOCUS OF THE CHAPTER
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
  10. Chapter 5: User-Centric Identity Management Architecture Using Credential-Holding Identity Agents
    1. ABSTRACT
    2. INTRODUCTION
    3. RELATED WORK AND DESIGN GOALS
    4. APPROACH
    5. KEY COMPONENTS
    6. SYSTEM ARCHITECTURE AND PROTOCOL
    7. EVALUATION
    8. CONCLUSION AND FUTURE WORK
  11. Chapter 6: Coming of Age or Just off the Boat?
    1. ABSTRACT
    2. INTRODUCTION
    3. ARCHITECTURE
    4. APPLICATIONS
    5. CHALLENGES
    6. COMMERCIAL SOLUTIONS (OFF THE SHELF SOFTWARE)
    7. CONCLUSION
  12. Chapter 7: Separating Private and Business Identities
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND: ANALYSIS OF SCENARIOS IN HUNGARY
    4. PRIVACY ON THE WEB
    5. SEPARATING IDENTITIES IN SOCIAL NETWORKS
    6. OTHER MEANS OF WORKPLACE SURVEILLANCE
    7. CONCLUSION
  13. Chapter 8: Identity and Access Management Architectures with a Focus on User Initiative
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MAIN FOCUS OF THE CHAPTER
    5. RELATED WORK
    6. FUTURE RESEARCH DIRECTIONS
    7. CONCLUSION
  14. Chapter 9: Starting the Revolution
    1. ABSTRACT
    2. INTRODUCTION
    3. WHAT IS AN IDMA?
    4. CREATING THE ENTERPRISE IDMA
    5. WILL IT WORK? WALKTHROUGH AND ANALYSIS
    6. CONCLUSION
  15. Chapter 10: Automatic Security Analysis of SAML-Based Single Sign-On Protocols
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. AUTOMATED SECURITY ANALYSIS OF SAML-BASED SSO PROTOCOLS
    5. FUTURE RESEARCH DIRECTIONS
    6. CONCLUSION
  16. Chapter 11: Denial of Service Resilience of Authentication Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. DOS ATTACK DETECTION IN AUTHENTICATION SYSTEMS
    5. CASE STUDY: THE SSO-SENSE RISK ASSESSMENT MODULE
    6. THRESHOLD PUZZLES AND ADAPTIVE THRESHOLD PUZZLES
    7. FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
  17. Chapter 12: Identity Management Systems
    1. ABSTRACT
    2. INTRODUCTION
  18. Chapter 13: Developing Proactive Security Dimensions for SOA
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. THE AUTHENTICATON AND SECURITY SERVICE (NSS)
    5. THE AUTHORIZATION SERVICE (AS)
    6. QUALITY OF SECURITY SERVICE (QOSS)
    7. FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
  19. Chapter 14: RBAC with Generic Rights, Delegation, Revocation, and Constraints
    1. ABSTRACT
    2. INTRODUCTION
    3. RBAC
    4. OUR SOLUTION: R+DRC
    5. DEFINITIONS AND ALGORITHMS
    6. PROPERTIES
    7. IMPLEMENTATION
    8. RELATED WORK
    9. DISCUSSION
  20. Chapter 15: Who is Guarding the Doors
    1. ABSTRACT
    2. INTRODUCTION
    3. AUTHENTICATION: BACKGROUND
    4. ROLE OF AUTHENTICATION IN ONLINE BANKING
    5. INTERNET BANKING – ISSUES
    6. FRAUD PREVENTION STRATEGIES
    7. CONCLUSION
  21. Chapter 16: Privacy in Identity and Access Management Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. PRIVACY REQUIREMENTS FOR I&AM SYSTEMS
    4. SOME COMMON SYSTEMS
    5. PREVIOUS RESEARCH PROJECTS
    6. ONGOING RESEARCH PROJECTS
    7. SUMMARY AND CONCLUSION
  22. Chapter 17: Identity Management
    1. ABSTRACT
    2. IDENTITIES
    3. IDENTITY MANAGEMENT
    4. IDENTITY MANAGEMENT MODELS
    5. CONCLUSION
  23. Chapter 18: Selecting and Implementing Identity and Access Management Technologies
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. MAIN FOCUS OF THE CHAPTER
    5. IAM CHALLENGES
    6. IAM SERVICES
    7. FUTURE RESEARCH DIRECTIONS
    8. CONCLUSION
  24. Compilation of References
  25. About the Contributors