skip to main content
10.1145/2659651.2659729acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
research-article

Mathematical Modelling of Identity, Identity Management and Other Related Topics

Authors Info & Claims
Published:09 September 2014Publication History

ABSTRACT

There exist disparate sets of definitions with different semantics on different topics of Identity Management which often lead to misunderstanding. A few efforts can be found compiling several related vocabularies into a single place to build up a set of definitions based on a common semantic. However, these efforts are not comprehensive and are only textual in nature. In essence, a mathematical model of identity and identity management covering all its aspects is still missing. In this paper we build up a mathematical model of different core topics covering a wide range of vocabularies related to Identity Management. At first we build up a mathematical model of Digital Identity. Then we use the model to analyse different aspects of Identity Management. Finally, we discuss three applications to illustrate the applicability of our approach. Being based on mathematical foundations, the approach can be used to build up a solid understanding on different topics of Identity Management.

References

  1. G. Alpár, J.-H. Hoepman, and J. Siljee. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management. CoRR, abs/1101.0427, 2011.Google ScholarGoogle Scholar
  2. K. Cameron. The Laws of Identity. 14th May, 2005. http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf.Google ScholarGoogle Scholar
  3. J. Camp. Digital identity. Technology and Society Magazine, IEEE, 23(3):34--41, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  4. D. Chadwick. Federated Identity Management. In FOSAD'08/09, volume 5705 of LNCS, pages 96--120, Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. Chadwick, G. Inman, K. Siu, and Md. S. Ferdous. Leveraging social networks to gain access to organisational resources. In DIM'11, pages 43--52, 2011 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. D. Chadwick and G. Inman. Attribute aggregation in federated identity management. Computer, 42(5):33--40, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Md. S. Ferdous, Audun Jøsang, K. Singh, and R. Borgaonkar. Security Usability of Petname Systems. In NordSec'09, volume 5838 of LNCS, pages 44--59, Springer, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. D. Ferraiolo and R. Kuhn. Role-Based Access Control. In In 15th NIST-NCSC National Computer Security Conference, pages 554--563, 1992.Google ScholarGoogle Scholar
  9. T. Gibson-Robinson, P. Armstrong, A. Boulgakov, and A. Roscoe. FDR3 - A Modern Refinement Checker for CSP. In TACAS'14, volume 8413 of LNCS, pages 187--201, Springer, 2014.Google ScholarGoogle Scholar
  10. U. Glasser and M. Vajihollahi. Identity management architecture. In ISI'08, pages 137--144, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  11. Identity Fraud Report: Data Breaches Becoming a Treasure Trove for Fraudsters. 2013.Google ScholarGoogle Scholar
  12. Identity Theft and Assumption Deterrence Act of 1998: Title 18 USC 1028. Accessed 1 April, 2014, 1998. http://www.ckfraud.org/title_18.html.Google ScholarGoogle Scholar
  13. D.-O. Jaquet-Chiffelle, E. Benoist, R. Haenni, F. Wenger, and Harald Zwingelberg. Virtual Persons and Identities. In FIDIS'09, pages 75--122, 2009.Google ScholarGoogle Scholar
  14. A. Jøsang, M. Al, and Z. Suriadi. Usability and privacy in identity management architectures. In ACSW'07, pages 143--152, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Jøsang and S. Pope. User Centric Identity Management. In AusCERT'05, pages 77--89, 2005.Google ScholarGoogle Scholar
  16. B.-J. Koops and R. Leenes. Identity theft, identity fraud and/or identity-related crime. Datenschutz und Datensicherheit-DuD, 30(9):553--556, 2006.Google ScholarGoogle ScholarCross RefCross Ref
  17. T. El Maliki and J.-M. Seigneur. User-centric Mobile Identity Management Services. Management, pages 33--76, 2008.Google ScholarGoogle Scholar
  18. N. Mitchison, M. Wilikens, L. Breitbach, R. Urry, and S. Portesi. Identity Theft - A Discussion Paper. Technical report, 2004.Google ScholarGoogle Scholar
  19. Modinis - Common Terminological Framework for Interoperable Electronic Identity Management. Accessed 28th June, 2011. https://www.cosic.esat.kuleuven.be/modinis-idm/twiki/bin/view.cgi/Main/GlossaryDoc.Google ScholarGoogle Scholar
  20. OAuth 2.0. http://oauth.net/2.Google ScholarGoogle Scholar
  21. OpenID Authentication 2.0 - Final. 5 December, 2007. http://openid.net/specs/openid-authentication-2_0.html.Google ScholarGoogle Scholar
  22. A. Pfitzmann and M. Hansen. A terminology for talking about privacy by data minimization:Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management. V0.34, August 10 2010. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf.Google ScholarGoogle Scholar
  23. A. Roscoe. The theory and practice of concurrency. Prentice Hall, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Roussos, D. Peterson, and UY. Patel. Mobile Identity Management: An Enacted View. INT. JOUR. E-COMMERCE, VOL, 8:81--100, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Shibboleth. http://shibboleth.internet2.edu/.Google ScholarGoogle Scholar
  26. J. Spivey and J. Abrial. The Z notation. Prentice Hall Hemel Hempstead, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. OASIS Standard. Assertions and Protocols for the OASIS Security Assertion Markup Language (SAML) V2.0. 15 March, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf.Google ScholarGoogle Scholar
  28. Using Access Control Lists (ACLs). http://www.hp.com/rnd/support/manuals/pdf/release_06628_07110/Bk2_Ch3_ACL.pdf.Google ScholarGoogle Scholar
  29. M. Veeningen, B. De Weger, and N. Zannone. Modeling identity-related properties and their privacy strength. In FAST'10, pages 126--140, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
    September 2014
    518 pages
    ISBN:9781450330336
    DOI:10.1145/2659651

    Copyright © 2014 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 9 September 2014

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    SIN '14 Paper Acceptance Rate32of109submissions,29%Overall Acceptance Rate102of289submissions,35%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader