원문정보
초록
영어
Mobile computing is becoming a widespread working tool, and as a large scale deployed technology, it should be strong enough to meet basic security expectations. Privacy in a mobile environment should be driven by the choice of appropriate identity management mechanisms, that will have a large impact on different aspects of daily life. Since people are unable to spend all their time administering their digital identities, the implementation of mobile identity management technologies has become a top priority for the involved companies, in order to protect their customers against fraudsters. Today, identity management and strong authentication are converging, since the provided solutions encompass user access, signing and verification of users and transactions through strong authentication. However, simply using strong authentication will not resolve all mobile digital identity requirements from a security viewpoint. Hence, our objective is to propose an extensible protocol based on an independent architectural model that provides a foundation for user-centric identity management.
목차
I. INTRODUCTION
II. GLOBAL CONTEXT
A. Mobility and Identity
B. Requirements fulfilled by identity 2.0 technologies
III. CURRENT APPROACHES TO MOBILE IDENTITY MANAGEMENT
A. Evolution of Mobile Identity
B. Types of Strong Authentication associated to Mobile IDM
C. Mobile IDM available solutions
D. Discussion on authentication methods versus mobile IDM
E. New concepts to develop in IDM
IV. OPEN MOBILE IDM PROPOSED FRAMEWORK
A. Context and profile management
B. Open Mobile IDM Architecture
C. Authentication process
D. Implementation issues of this framework
V. CONCLUSION
ACKNOWLEDGMENT
REFERENCES