Toggle Main Menu Toggle Search

Open Access padlockePrints

User centricity: A taxonomy and open issues

Lookup NU author(s): Dr Thomas Gross

Downloads

Full text for this publication is not currently held within this repository. Alternative links are provided below where available.


Abstract

User centricity is a significant concept in federated identity management (FIM), as it provides for stronger user control and privacy. However, several notions of user-centricity in the FIM community render its semantics unclear and hamper future research in this area. Therefore, we consider user-centricity abstractly and establish a comprehensive taxonomy encompassing user-control, architecture, and usability aspects of user-centric FIM. We highlight the various mechanisms to achieve the properties identified in the taxonomy. We show how these mechanisms may differ based on the underlying technologies which in turn result in different trust assumptions. We classify the technologies into two predominant variants of user-centric FIM systems with significant feature sets. We distinguish credential-focused systems, which advocate offline identity providers and long-term credentials at a user's client, and relationship-focused systems, which rely on the relationships between users and online identity providers that create short-term credentials during transactions. Note that these two notions of credentials are quite different. The former encompasses cryptographic credentials as defined by Lysyanskaya et al., in Selected Areas in Cryptography, LNCS, vol. 1758, and the latter encompasses federation tokens as used in today's FIM protocols like Liberty.We raise the question where user-centric FIM systems may go – within the limitations of the user-centricity paradigm as well as beyond them. Firstly, we investigate the existence of a universal user-centric FIM system that can achieve a superset of security and privacy properties as well as the characteristic features of both predominant classes. Secondly, we explore the feasibility of reaching beyond user centricity, that is, allowing a user of a user-centric FIM system to again give away user control by means of an explicit act of delegation. We do neither claim a solution for universal user-centric systems nor for the extension beyond the boundaries of user centricity, however, we establish a starting point for both ventures by leveraging the properties of a credential-focused FIM system.


Publication metadata

Author(s): Bhargav-Spantzel A, Camenisch J, Gross T, Sommer D

Publication type: Article

Publication status: Published

Journal: Journal of Computer Security

Year: 2007

Volume: 15

Issue: 5

Pages: 493-527

ISSN (print): 0926-227X

ISSN (electronic): 1875-8924

Publisher: IOS Press

URL: https://iospress.metapress.com/content/tv36745613143880/resource-secured/?target=fulltext.pdf


Actions

Find at Newcastle University icon    Link to this publication


Share