REVIEW OF DIGITAL IDENTITY MANAGEMENT SYSTEM MODELS
Keywords:
Digital Identity, Silo System, Federated IDMS, Centralized IDMs, User-centric identity systems.Abstract
Purpose: Public and private Institutions are presently facing challenges in the control of users accessing information via online platforms. Institutions presently control classified user identity information via online platforms. Trends indicate there is insignificant control of classified information within organizations, making it one of the serious threats facing governments and organizations. Digital Identity Management Systems (DIMS) are very vital in organization infrastructure for the purpose of authenticating users and supporting unlimited access control of services. The core intention of this paper is to review the existing digital identity management models and analyze the extent of the research work.
Methodology: The paper will review the characteristics of Digital Identity Management Models and evaluate on how trust and privacy issues impact or influence the establishment of an effective digital identity management system.
Findings: This paper reviews existing digital identity management system models. Regulation of information in cases when the entities requiring access to it are both highly diverse and spread is among the most significant challenges to effective identity management. A variety of normal technical questions also faces the field, for example, the manner in which information in centralized and distributed databases can be controlled. In a bid to ensure that information related to authorization and authentication is up to date and dependable within an organization's systems of information, handling personnel has been a major concern of identity management systems.
Unique contribution to theory, practice and policy: A hybrid digital Identity Management System model approach that will aim at solving the gaps identified in the existing digital identity models will be the future paper's subject of concern.
Downloads
References
Ahn, G. J., Ko, M., and Shehab, M. (2009, June). Privacy-enhanced usercentric identity management. In Communications, 2009. ICC'09. IEEE International Conference on (pp. 1-5). IEEE.
Albayan (2009) "ID Card cuts down process time to 7 seconds at Dubai Courts", Al Bayan Newspaper, [Online]. Website: www.albayan.ae. Issue date: 02 March 2009.
Alenezi, Hussain; Tarhini, Ali; Sharma, Sujeet Kumar (2015). "De-velopment of quantitative model to investigate the strategic relation-ship between information quality and e-government benefits". Trans-forming Government: People, Process and Policy. 9 (3): 324-351. doi:10.1108/TG-01-2015-0004. Retrieved 5 January 2016.
Allen, C. (1995) "Smart Cards Part of U.S. Effort in Move to Electronic Banking", Smart Card Technology International: The Global Journal of Advanced Card Technology, Townsendm R. (ed.), London: Global Projects Group
Barroso, L. A., Clidaras, J., and Holzle, U. (2013). The datacenter as a computer: An introduction to the design of warehouse-scale machines. Synthesis lectures on computer architecture, 8(3), 1-154.
Belanger, France, and Crossler, R. E. (2011). Privacy in the digital age: a review of information privacy research in information systems. MIS Q., 35(4), 1017-1042.
Bertino, E. (2010). "Digital Identity Management and Trust Negotiation," in Security for Web Services and Service-Oriented Architectures, Berlin, Springer
Camenisch, J. (2012). Information privacy?!. Computer networks, 56(18), 3834-3848.
Cavoukian, A., and Jonas, J. (2012). Privacy by design in the age of big data (pp. 1-17). Information and Privacy Commissioner of Ontario, Canada.
Coates, B.E. (2001) "SMART Government on Line, not in Line: Op-portunities, Challenges and Concerns for Public Leadership." The Public Manager, vol. 30, no. 4, pp. 37-40
Connolly, P. J. (2010). OAuth is the 'hottestthing'in identity manage-ment. eWeek, 27(9), 12-13
Donohue, M., and Carblanc, A. (2008). The role of digital identity management in the interneteconomy: a primer for policymakers. No. DSTI/ICCP/REG, 10.EUC Workshops, Denko, M. K., and International Federation for Information Processing
Fioravanti, F., and Nardelli, E. (2008). Identity Management for Egov-ernment Services. In Chen, (eds.). Digital government: e-government research, case studies andImplementation. (pp. 331-352). Berlin: Springer.
Guthery, S.B. and Jurgensen, T.M. (1998) SmartCard Developer's Kit. Macmillan Technical Publishing.
Hammer-Lahav, E. (2009, October 16). Beginner's Guide to OAuth - Part I: Overview.
Hovarka, D. Incommensurability and multi-paradigm grounding in de-sign science research: Implications for creating knowledge. In Human Benefit through the Diffusion of Information Systems Design Science Research, J. Pries-Heje, J. Venable, D. Bunker,N. Russo, and J. DeGross, Eds., vol. 318 of IFIP Advances in Information and Communication Technology. Springer Boston, 2010, pp. 13-27.
Jain Palvia, Shailendra. "E-Government and E-Governance: Definitions/ Domain" (PDF). csi-sigegov.org. Computer Society of India. Retrieved 12 December 2016.
Jøsang, A., and Pope, S. (2005). User centric identity management. In AusCERT Asia Pacific Information Technology Security Conference (p. 77).
K. Peffers, T. Tuunanen, M. Rothenberger and S. Chatterjee. "A De-sign Science Research Methodology for Information Systems Research." Journal of Management Information Systems (2008) 24(3): 45-77.
Kothari, C. R. (2004). Research Methodology: Methods and Techniques (2nd ed.). Oxford University Press, Oxford.
Kumar, V., Mukerji, B., Irfan, B. and Ajax, P. (2007) Factors for Success-ful e-GovernmentAdoption: A Conceptual Framework. The Electronic Journal of e-Government, 5, 1, 63-77
L'Amrani, H., Berroukech, B. E., El Idrissi, Y. E. B., and Ajhoun, R. (2016, October). Identity management systems: Laws of identity for models 7 evaluation. In Information Science and Technology (CiSt), 2016 4th IEEE International Colloquium on (pp. 736-740). IEEE.
Lips, M., Taylor, J. A., and Economic and Social Research Council (Great Britain). (2007).Personal identification and identity management in new modes of e-government.
Mahler, T. (2010). Legal Risk Management Developing and Evaluating Elements of a Method for Proactive Legal Analyses, With a Particular Focus on Contracts. Monograph, The Faculty of Law, University of Oslo, Postboks, 6706.
Mangiuc, D. M. (2012). Cloud Identity and Access Management-A Model Proposal. Journal of Accounting and Management Information Systems, 11(3), 484-500.
Microsoft. (2011, February). Microsoft and U-Prove"” End to End Trust "” Microsoft TrustworthyComputing. MICROSOFT U-PROVE CTP RELEASE 2. Retrieved October 14,2012, from http://www.microsoft.com/mscorp/twc/endtoendtrust/vision/uprove.aspx
Shibboleth. (2013). Shibboleth - About. Retrieved January 10, 2013, fromhttp://shibboleth.net/about/index.html
Sismondo, S. (2011). An introduction to science and technology studies. John Wiley and Sons.
Thakur, M. A., and Gaikwad, R. (2015, January). User identity and Access Management trends in IT infrastructure-an overview. In Pervasive Computing (ICPC), 2015 International Conference on (pp. 1-4). IEEE.
Downloads
Published
How to Cite
Issue
Section
License
Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution (CC-BY) 4.0 License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.