Trust requirements in identity management

Audun Jøsang*, John Fabre, Brian Hay, James Dalziel, Simon Pope

*Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

    59 Citations (Scopus)

    Abstract

    Identity management refers to the process of representing and recognising entities as digital identities in computer networks. Authentication, which is an integral part of identity management, serves to verify claims about holding specific identities. Identity management is therefore fundamental to, and sometimes include, other security constructs such as authorisation and access control. Different identity management models will have different trust requirements. Since there are costs associated with establishing trust, itwill be an advantage to have identity management models with simple trust requirements. The purpose of this paper is to describe trust problems in current approaches to identity management, and to propose some solutions.

    Original languageEnglish
    Title of host publicationACSW Frontiers 2005 - Third Australasian Workshop on Grid Computing and e-Research, AusGrid 2005 and the Third Australasian Information Security Workshop, AISW 2005
    EditorsPaul Montague, Rei Safavi-Naini
    Pages99-108
    Number of pages10
    Volume44
    Publication statusPublished - 2005
    Event3rd Australasian Workshop on Grid Computing and e-Research, AusGrid 2005 and 3rd Australasian Information Security Workshop, AISW 2005 - Newcastle, NSW, Australia
    Duration: 31 Jan 20051 Feb 2005

    Other

    Other3rd Australasian Workshop on Grid Computing and e-Research, AusGrid 2005 and 3rd Australasian Information Security Workshop, AISW 2005
    CountryAustralia
    CityNewcastle, NSW
    Period31/01/051/02/05

    Fingerprint Dive into the research topics of 'Trust requirements in identity management'. Together they form a unique fingerprint.

    Cite this