did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9781608070398

Identity Management

by ;
  • ISBN13:

    9781608070398

  • ISBN10:

    1608070395

  • Format: Hardcover
  • Copyright: 2010-12-31
  • Publisher: Artech House
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $120.00
  • Digital
    $122.63
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and complying with regulatory controls. This practical resource offers you a in-depth understanding of how to design, deploy and assess identity management solutions. It provides a comprehensive overview of current trends and future directions in identity management, including best practices, the standardization landscape, and the latest research finding. Additionally, you get a clear explanation of fundamental notions and techniques that cover the entire identity lifecycle.

Author Biography

Elisa Bertino is a professor and research director at Purdue University in West Lafayette, Indiana. She holds a Ph.D. in computer science and is a Fellow of the IEEE Computer Society and the Association for Computing Machinery. Kenji Takahashi is the president and CEO of NTT Multimedia Communications Laboratories, Inc., in San Mateo, California. He received a Ph.D. in computer science from the Tokyo Institute of Technology.

Table of Contents

Introductionp. 11
Stakeholders and Business Opportunitiesp. 12
Identity Ecosystem and Key Trendsp. 14
Challenges in Identity Managementp. 18
Overview of This Bookp. 18
Referencesp. 19
What Is Identity Management?p. 21
Stakeholders and Their Requirementsp. 25
Subjectsp. 25
Identity Providersp. 27
Relying Partiesp. 27
Control Partiesp. 28
Relationships Between Stakeholdersp. 28
Identity Life Cyclep. 29
Creationp. 30
Usagep. 32
Updatep. 34
Revocationp. 35
Governancep. 36
Identity Assurancep. 37
Referencesp. 41
Fundamental Technologies and Processesp. 45
Credentialsp. 46
Basic Conceptsp. 46
Public-Key Certificates and Public-Key Infrastructuresp. 48
Attribute and Authorization Certificatesp. 51
Credential Delegationp. 52
Proxy Certificatesp. 54
Single Sign-Onp. 55
Kerberos Protocolsp. 57
Reverse Proxy-Based SSOp. 60
Attribute Federationp. 61
Distributed Mediationp. 63
Single Party-Based Mediationp. 63
Privacyp. 65
Pseudonym Systemsp. 66
Anonymous Credentialsp. 68
Assurance and Compliancep. 70
Referencesp. 71
Standards and Systemsp. 75
Overviewp. 76
OASIS Security Assertion Markup Language (SAML)p. 77
Overviewp. 77
Specification Structurep. 79
Web SSOp. 86
Use Casesp. 92
Liberty Identity Web Services Frameworkp. 93
Opt-In Discovery Registrationp. 96
Dynamic Acquisition of Consent from Subjectsp. 96
Federated Identity-Based Access Controlp. 97
Pseudonym Mappingp. 97
Use Casesp. 97
OpenIDp. 98
Overviewp. 98
Authenticationp. 98
Attribute Exchange (AX)p. 101
Provider Authentication Policy Extension (PAPE)p. 101
Simple Registration (SREG)p. 102
Use Casesp. 102
Information Card-Based Identity Management (IC-IDM)p. 104
Overviewp. 104
WS-MetadataExchangep. 108
WS-Trustp. 108
Use Casesp. 108
Towards Interoperabilityp. 110
Use Casesp. 111
Comparative Analysis of SAML, OpenID, and Information Cardsp. 119
Security Analysisp. 121
Confidentialityp. 122
Integrityp. 126
Availabilityp. 127
Repudiationp. 128
Authenticationp. 129
Authorizationp. 129
Privacy Analysisp. 130
Research Prototypesp. 131
SASSOp. 132
VeryIDXp. 133
SWIFTp. 134
Emerging Areas: Social Networks, Mobile, and Cloud Computingp. 134
Referencesp. 139
Challengesp. 147
Usabilityp. 148
Usability Principles and Requirementsp. 148
Evaluating the Usability of Identity Management Solutionsp. 151
Antiphishing Measuresp. 152
Access Controlp. 153
Privacy Protectionp. 155
Privacy Policiesp. 156
Anonymization of Personally Identifiable Information and Privacy-Preserving Data Miningp. 162
Privacy Protection in Emerging Servicesp. 166
Trust Managementp. 167
Reputation of the Partyp. 167
Objective Verification of Certain Party Characteristicsp. 168
Possession of Credentials Attesting Certain Party Identity Informationp. 168
Trust in the Context of Identity Managementp. 169
Interoperability Challengep. 169
Universal User Experiencesp. 170
Naming Heterogeneity Managementp. 170
Biometricsp. 171
Referencesp. 175
Conclusionsp. 181
Referencesp. 185
About the Authorsp. 187
Indexp. 189
Table of Contents provided by Ingram. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program