Auflistung P237 - Open Identity Summit 2014 nach Titel
1 - 10 von 15
Treffer pro Seite
- KonferenzbeitragAnalyzing the state-of-the-art of scientific publications on identity management: is there an economic perspective?(Open Identity Summit 2014, 2014) Fähnrich, Nicolas; Kubach, MichaelAlthough sophisticated identity management (IdM) technologies have been developed for quite a while, they are not as broadly used as could be expected - in the corporate but especially in an end-user context. Some authors have argued that the reason for this lack of diffusion is not to be found in technological or privacy shortcomings. Rather, it is attributed to the disregard of an economic perspective in the research on IdM and the development of IdM-technologies. This argument, has so far not been scrutinized in a systematic way. Therefore, this article performs a literature analysis of scientific publications to analyze whether there is indeed a lack of publications on IdM that employ an economic perspective. The results of the analysis seem to support the argument that the economic perspective is neglected in the current research on IdM.
- KonferenzbeitragApproach to vendor authentication(Open Identity Summit 2014, 2014) Houdeau, Detlef; Meher, Amit Kumer
- KonferenzbeitragA DNSSEC-based trust infrastructure(Open Identity Summit 2014, 2014) Bruegger, Bud P.; Özmü, ErayThe management of trust issues is central to a wide variety of digital systems, including systems dealing with electronic signature, authentication, or signing of applications. The common approach to trust management is the use of possibly signed trust lists and trust stores that enumerate trusted issuers. This approach fails to scale well and is thus unsuited for the implementation of larger trust infrastructures, as, for example, in support of a regional authentication infrastructure that enables a marketplace of services. This paper proposes to use the domain name system (DNS) with security extension (DNSSEC) as a base for the creation of a globally scalable and flexible trust infrastructure. As opposed to trust lists or stores, this also provides a vehicle for the efficient and secure dissemination of trust information among stakeholders.
- KonferenzbeitragEidas as guideline for the development of a pan European eid framework in futureid(Open Identity Summit 2014, 2014) Cuijpers, Colette; Schroers, JessicaThis paper addresses the Regulation on Electronic transactions in the internal market: electronic identification and trust services (eIDAS) and analyses this regulatory framework in relation to the pan European eID infrastructure being developed in the FutureID project. The aim of this paper is to identify if eIDAS sets forward any legal requirements that need to be implemented in the FutureID infrastructure. Even though the focus of this paper is on the development of the FutureID infrastructure, the description of eIDAS and the analysis of its main requirements for technical developers are in general relevant to the development of online identification and authentication schemes.
- KonferenzbeitragENX ID - an architecture for practical and secure cross company authentication(Open Identity Summit 2014, 2014) Kubach, Michael; Roßnagel, Heiko; Oly, Lennart; Wehrenberg, ImmoThis paper introduces a development approach and a novel architecture for cross company identity management and authentication. It aims to design an architecture, which is practically implementable in the highly collaborative environment that exists in the automotive industry. The paper sketches the conducted marked research to obtain such a model and presents an architecture design based on a trusted intermediary.
- KonferenzbeitragIT trends with impact on privacy and security(Open Identity Summit 2014, 2014) Hoepner, Petra; Schmidt, Maximilian; Welzel, ChristianBased on the revelation of broad surveillance programs and fundamental security risks, social discussions arise on security and privacy issues. This paper suggests a fundamental change in such discussions. Outlining current IT trends it recommends to focus on innovative perspectives rather than acquired behaviour.
- KonferenzbeitragMaking authentication stronger and more cost efficient with web of trust(Open Identity Summit 2014, 2014) Hulsebosch, Bob; Wegdam, Maarten; Oostdijk, Martijn; Dijk, Joost Van; Wijnen, Remco Poortinga - VanSolid registration processes for identity registration including proofing, vetting and binding are essential for strong authentication solutions. Solid typically implies a face-2-face component in the registration process, which is expensive and not user friendly. Alternatives that rely on remote registration often result in weak binding or are overly complex. We propose a web of trust approach in which users can indicate trust in the identity of other users. It combines the best of remote and physical registration practices. There is no need for a physical registration desk as other users in the web of trust take over the identification task. This paper describes how to achieve web of trust enhanced authentication assurance.
- Editiertes BuchOpen Identity Summit 2014(2014)
- KonferenzbeitragSAML Privacy-Enhancing Profile(Open Identity Summit 2014, 2014) Horsch, Moritz; Tuengerthal, Max; Wich, TobiasWe present the SAML Privacy-Enhancing (PE) profile which empowers users to take control of the authentication process and their personal data. Users have the full control of the application flow and get detailed information about the involved participants and the revealed attributes. This enables users to give informed consent for the authentication. The new profile builds on well-established standards and technologies. We use the common SAML Authentication Request and provide the additional information as extensions based on SAML Metadata.
- KonferenzbeitragSecure and trustworthy file sharing over cloud storage using eid tokens(Open Identity Summit 2014, 2014) Duarte, Eduardo; Pinheiro, Filipe; Zúquete, André; Gomes, HélderThis paper presents a multi-platform, open-source application that aims to protect data stored and shared in existing cloud storage services. The access to the cryptographic material used to protect data is implemented using the identification and authentication functionalities of national electronic identity (eID) tokens. All peer to peer dialogs to exchange cryptographic material is implemented using the cloud storage facilities. Furthermore, we have included a set of mechanisms to prevent files from being permanently lost or damaged due to concurrent modification, deletion and malicious tampering. We have implemented a prototype in Java that is agnostic relatively to cloud storage providers; it only manages local folders, one of them being the local image of a cloud folder. We have successfully tested our prototype in Windows, Mac OS X and Linux, with Dropbox, OneDrive, Google Drive and SugarSync.