Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Assurance for federated identity management
Baldwin A., Casassa Mont M., Beres Y., Shiu S. Journal of Computer Security18 (4):541-572,2010.Type:Article
Date Reviewed: Oct 6 2010

Even though identity management solutions have existed for some time, the advent of social networks, content management system (CMS) platforms, and cloud computing has brought some much needed advances in this technology. Federated identity management has received a lot of attention in the last few years, and organizations are utilizing it to make it easier for their users to move across multiple Web sites without having to worry about creating separate user accounts for each one.

The authors of this paper noticed the increase in adoption rates of federated identity technology and raised questions about achieving assurance in those implementations. Needless to say, it is a nontrivial task to show assurance in the heterogeneous ecosystem that the World Wide Web has become; the authors propose a few techniques to do just that.

The paper outlines ways in which “model-based technology can be used to automate and improve the collection, analysis presentation, and sharing of the required information” to achieve assurance in a design utilizing federated identity management solutions.

The authors provide some background on audit methodologies, and discuss the overall identity management life cycle, citing the risks and controls that exist today. They go on to propose an assurance framework and show how it can be used in federated identity management environments. Privacy policy enforcement work and its effectiveness in improving assurance models are also discussed.

Overall, the authors have raised an important question regarding ways to provide assurance in federated identity environments. Furthermore, they propose some ways to utilize existing models and policies to improve assurance.

Reviewer:  Phoram Mehta Review #: CR138452 (1102-0193)
Bookmark and Share
  Reviewer Selected
Editor Recommended
Featured Reviewer
 
 
Data Encryption (E.3 )
 
 
Security and Protection (C.2.0 ... )
 
 
Standards (E.3 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy