Digital Identity Management and Trust Negotiation
Digital Identity Management and Trust Negotiation
As more and more activities and processes such as shopping, discussion, enter-
tainment and business collaboration are conducted in the cyber world, digital
identities, be them user names, passwords, digital certificates, or biometric
features and digital identity management have become fundamental to under-
pinning accountability in business relationships, controlling the customization
of the user experience, protecting privacy, and adhering to regulatory con-
trols. In its broadest sense, identity management revolves around the enter-
prise process of adding or removing (provisioning) digital identity information
and managing their authentication and associated access rights (policy) to in-
formation systems and applications (“access management”). Hence, digital
identity management is strictly intertwined with identification technologies,
such as biometrics, and authorization and access control technologies. More-
over, digital identity management requires us to consider at the same time
aspects and technologies related to usability and management. Digital iden-
tity is not a static information too. It may evolve over time, and hence digital
identity management requires us to consider and apply change management
techniques to digital identity representations.
Digital Identity management is an emerging research field which addresses
the aspects mentioned above. Moreover, the emergence of SOA and Web
services-based enterprise information systems requires us to consider not only
the technical aspects of distribution but also the impact of service autonomy
on identity management solutions.
This chapter covers all relevant notions related with identity management
and then discusses how digital identity management can be combined with
negotiation techniques to provide a more flexible but still privacy-preserving
solution.
The chapter first provides an overview of the main concepts related to
digital identity management, focusing on recent federated approaches, namely
Liberty-Alliance initiative [166], WS-Federation [170], the Shibboleth System
[138], and Microsoft CardSpace. Issues related to identity management in
the context of grid computing systems are discussed, in that these systems
represent a significant application context for SOA and digital identity man-
agement. The chapter also presents the trust negotiation paradigm, its main
concepts and protocols, and possible applications of it in the context of fed-
erated identity management systems. Finally, to show the advantages of the
digital identity management and trust negotiation approaches, the chapter
presents a federated attribute management and trust negotiation solution,
which provides a truly distributed approach to the management of user iden-
tities and user attributes with negotiation capabilities.