Open Access Open Access  Restricted Access Subscription Access

Online Identity Management Techniques: Identification and Analysis of Flaws and Standard Methods


 

Cyberspace, and the technologies that enable it, allow people of every nationality, race and point of view to communicate, cooperate, and prosper like never before. Today as nations and people use the networks that are all around us, everyone has to work together to realize the potential for greater prosperity and security or we will succumb to narrow interests and undue fears that limit progress. Internet is one of the best examples of a self organized community as society, academia, private sector and government work together for its effective management. We have to build a cyberspace which is open, interoperable, secure and trustworthy. We have studied the related literature and in this paper, we present and discuss the flaws identified in the Identity Management processes. We also discuss the techniques which are proposed or implemented for the online Identity Management. A special attention is also given to the implementation perspective of the proposed Trust Model for India.

Keywords

Identity Management, Online Identity, Privacy
User
Notifications
Font Size

Abstract Views: 107

PDF Views: 0




  • Online Identity Management Techniques: Identification and Analysis of Flaws and Standard Methods

Abstract Views: 107  |  PDF Views: 0

Authors

Abstract


Cyberspace, and the technologies that enable it, allow people of every nationality, race and point of view to communicate, cooperate, and prosper like never before. Today as nations and people use the networks that are all around us, everyone has to work together to realize the potential for greater prosperity and security or we will succumb to narrow interests and undue fears that limit progress. Internet is one of the best examples of a self organized community as society, academia, private sector and government work together for its effective management. We have to build a cyberspace which is open, interoperable, secure and trustworthy. We have studied the related literature and in this paper, we present and discuss the flaws identified in the Identity Management processes. We also discuss the techniques which are proposed or implemented for the online Identity Management. A special attention is also given to the implementation perspective of the proposed Trust Model for India.

Keywords


Identity Management, Online Identity, Privacy