Digital identity management within networked information systems: From vertical silos view into horizontal user-supremacy processes management

7Citations
Citations of this article
22Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Users count on digital identities to make everyday's tasks, therefore digital identities become valuable assets. Within networked and interconnected information systems arena, where digital identity related risks arise, effective digital identity management is required in order to secure and protect them. We provide from the literature and discuss taxonomy of digital identity management based on definition-focus. While, user-supremacy processes guarantee user control over attributes and privacy but they should be integrated and aligned to common networked information systems' security policies and business strategy. We argument that digital identity management should change from being vertical or functional into inter-information systems and horizontal integrated business processes with service orientations. We point out that SoaML-based methodology would help to decompose and reduce digital identity management requirements into a set of collaborative services. © 2011 IEEE.

Cite

CITATION STYLE

APA

Ayed, G. B., & Ghernaouti-Hélie, S. (2011). Digital identity management within networked information systems: From vertical silos view into horizontal user-supremacy processes management. In Proceedings - 2011 International Conference on Network-Based Information Systems, NBiS 2011 (pp. 98–103). https://doi.org/10.1109/NBiS.2011.24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free