earticle

논문검색

Security and Trust

MIdM : an Open Architecture for Mobile Identity Management

원문정보

초록

영어

Mobile computing is becoming a widespread working tool, and as a large scale deployed technology, it should be strong enough to meet basic security expectations. Privacy in a mobile environment should be driven by the choice of appropriate identity management mechanisms, that will have a large impact on different aspects of daily life. Since people are unable to spend all their time administering their digital identities, the implementation of mobile identity management technologies has become a top priority for the involved companies, in order to protect their customers against fraudsters. Today, identity management and strong authentication are converging, since the provided solutions encompass user access, signing and verification of users and transactions through strong authentication. However, simply using strong authentication will not resolve all mobile digital identity requirements from a security viewpoint. Hence, our objective is to propose an extensible protocol based on an independent architectural model that provides a foundation for user-centric identity management.

목차

Abstract
 I. INTRODUCTION
 II. GLOBAL CONTEXT
  A. Mobility and Identity
  B. Requirements fulfilled by identity 2.0 technologies
 III. CURRENT APPROACHES TO MOBILE IDENTITY MANAGEMENT
  A. Evolution of Mobile Identity
  B. Types of Strong Authentication associated to Mobile IDM
  C. Mobile IDM available solutions
  D. Discussion on authentication methods versus mobile IDM
  E. New concepts to develop in IDM
 IV. OPEN MOBILE IDM PROPOSED FRAMEWORK
  A. Context and profile management
  B. Open Mobile IDM Architecture
  C. Authentication process
  D. Implementation issues of this framework
 V. CONCLUSION
 ACKNOWLEDGMENT
 REFERENCES

저자정보

  • Mohamed Dafir Ech-Cherif El Kettani Information Security Research Team – ISeRT, Ecole Nationale Supérieure d'Informatique et d'Analyse des Systèmes – ENSIAS, University Mohammed V-Souissi, Rabat, Morocco
  • Brahim En-Nasry Information Security Research Team – ISeRT, Ecole Nationale Supérieure d'Informatique et d'Analyse des Systèmes – ENSIAS, University Mohammed V-Souissi, Rabat, Morocco

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.