User Requirement Model for Federated Identities Threats

Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey...

Full description

Saved in:
Bibliographic Details
Main Authors: Ahmad, Zubair, Ab Manan, Jamallul-Lail, Sulaiman, Suziah
Format: Conference or Workshop Item
Published: 2010
Subjects:
Online Access:http://eprints.utp.edu.my/4800/1/ZubairAhmad_User_Requirements_Model_for_Federated_Identities_Threat.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05579819
http://eprints.utp.edu.my/4800/
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.utp.eprints.4800
record_format eprints
spelling my.utp.eprints.48002017-01-19T08:23:52Z User Requirement Model for Federated Identities Threats Ahmad, Zubair Ab Manan, Jamallul-Lail Sulaiman, Suziah QA75 Electronic computers. Computer science Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency, identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform. 2010-08 Conference or Workshop Item PeerReviewed application/pdf http://eprints.utp.edu.my/4800/1/ZubairAhmad_User_Requirements_Model_for_Federated_Identities_Threat.pdf http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05579819 Ahmad, Zubair and Ab Manan, Jamallul-Lail and Sulaiman, Suziah (2010) User Requirement Model for Federated Identities Threats. In: 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE) 2010, August 20-22, 2010, Chengdu, China. . http://eprints.utp.edu.my/4800/
institution Universiti Teknologi Petronas
building UTP Resource Centre
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Teknologi Petronas
content_source UTP Institutional Repository
url_provider http://eprints.utp.edu.my/
topic QA75 Electronic computers. Computer science
spellingShingle QA75 Electronic computers. Computer science
Ahmad, Zubair
Ab Manan, Jamallul-Lail
Sulaiman, Suziah
User Requirement Model for Federated Identities Threats
description Federated identity management system interconnects distributed island of identity management systems with federated identity standards with single sign-on facility. In an open environment, such as those of a federated identity management system a user single sign-on credentials, can easily fall prey to identity theft, or unlawful information gathering. It may use either existing account or new account fraud. In this paper, we present scenarios related to identity theft, unlawful information gathering and tracking. We show the main issue of lack of platform trust in platforms involve in federated systems and discussed the consequences of respective threats on them. In an effort to present a holistic approach to handle security, trust and privacy, we propose a user requirement model involving these core issues for federated identities. These requirements include system trustworthiness, hardware protected key generations, usability, efficiency, identity information validity, privacy, accountability and system robustness. In our proposed model, Trusted Platform Module (TPM), is the fundamental component which ties and binds all communicating platforms together in authentication, verification and trustworthiness of the platform.
format Conference or Workshop Item
author Ahmad, Zubair
Ab Manan, Jamallul-Lail
Sulaiman, Suziah
author_facet Ahmad, Zubair
Ab Manan, Jamallul-Lail
Sulaiman, Suziah
author_sort Ahmad, Zubair
title User Requirement Model for Federated Identities Threats
title_short User Requirement Model for Federated Identities Threats
title_full User Requirement Model for Federated Identities Threats
title_fullStr User Requirement Model for Federated Identities Threats
title_full_unstemmed User Requirement Model for Federated Identities Threats
title_sort user requirement model for federated identities threats
publishDate 2010
url http://eprints.utp.edu.my/4800/1/ZubairAhmad_User_Requirements_Model_for_Federated_Identities_Threat.pdf
http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=05579819
http://eprints.utp.edu.my/4800/
_version_ 1738655370583212032
score 13.159267