Modeling identity management architecture within a social setting

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Managing digital identity is about intelligently using the identity management solutions to achieve business goals. There is a pressing need for frameworks and models to support the analysis and design of complex social relationships with regard to identity in order to ensure the effective use of existing protection technologies and control mechanisms. This paper explores how the GRL/i* approach could be used in the design of a more integrated and comprehensive identity management solutions for organizations. Using this modeling approach, we may explicitly relate the different strategic rationales of stakeholders to the alternative design choices in the context of identity management. We argue that different actor configurations and vendor-based identity management components may be evaluated and selectively combined to achieve the best requirements satisfaction level based on strategic analysis results. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Liu, L., & Yu, E. (2006). Modeling identity management architecture within a social setting. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3841 LNCS, pp. 917–922). Springer Verlag. https://doi.org/10.1007/11610113_95

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free