User Requirement Model for Federated Identities Threats
Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference or Workshop Item |
Published: |
2010
|
Subjects: | |
Online Access: | http://eprints.utp.edu.my/4800/1/ZubairAhmad_User_Requirements_Model_for_Federated_Identities_Threat.pdf http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05579819 http://eprints.utp.edu.my/4800/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Universiti Teknologi Petronas |
id |
my.utp.eprints.4800 |
---|---|
record_format |
eprints |
spelling |
my.utp.eprints.48002017-01-19T08:23:52Z User Requirement Model for Federated Identities Threats Ahmad, Zubair Ab Manan, Jamallul-Lail Sulaiman, Suziah QA75 Electronic computers. Computer science Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency, identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform. 2010-08 Conference or Workshop Item PeerReviewed application/pdf http://eprints.utp.edu.my/4800/1/ZubairAhmad_User_Requirements_Model_for_Federated_Identities_Threat.pdf http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05579819 Ahmad, Zubair and Ab Manan, Jamallul-Lail and Sulaiman, Suziah (2010) User Requirement Model for Federated Identities Threats. In: 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) 2010, August 20-22, 2010, Chengdu, China. . http://eprints.utp.edu.my/4800/ |
institution |
Universiti Teknologi Petronas |
building |
UTP Resource Centre |
collection |
Institutional Repository |
continent |
Asia |
country |
Malaysia |
content_provider |
Universiti Teknologi Petronas |
content_source |
UTP Institutional Repository |
url_provider |
http://eprints.utp.edu.my/ |
topic |
QA75 Electronic computers. Computer science |
spellingShingle |
QA75 Electronic computers. Computer science Ahmad, Zubair Ab Manan, Jamallul-Lail Sulaiman, Suziah User Requirement Model for Federated Identities Threats |
description |
Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency,
identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform. |
format |
Conference or Workshop Item |
author |
Ahmad, Zubair Ab Manan, Jamallul-Lail Sulaiman, Suziah |
author_facet |
Ahmad, Zubair Ab Manan, Jamallul-Lail Sulaiman, Suziah |
author_sort |
Ahmad, Zubair |
title |
User Requirement Model for Federated Identities Threats |
title_short |
User Requirement Model for Federated Identities Threats |
title_full |
User Requirement Model for Federated Identities Threats |
title_fullStr |
User Requirement Model for Federated Identities Threats |
title_full_unstemmed |
User Requirement Model for Federated Identities Threats |
title_sort |
user requirement model for federated identities threats |
publishDate |
2010 |
url |
http://eprints.utp.edu.my/4800/1/ZubairAhmad_User_Requirements_Model_for_Federated_Identities_Threat.pdf http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05579819 http://eprints.utp.edu.my/4800/ |
_version_ |
1738655370583212032 |