Digital identity management:
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
London
ISTE Press
2015
Oxford Elsevier |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XV, 250 Seiten Illustrationen |
ISBN: | 9781785480041 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV042508249 | ||
003 | DE-604 | ||
005 | 20190207 | ||
007 | t | ||
008 | 150417s2015 a||| |||| 00||| eng d | ||
020 | |a 9781785480041 |9 978-1-78548-004-1 | ||
035 | |a (OCoLC)915140149 | ||
035 | |a (DE-599)BVBBV042508249 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-473 |a DE-M382 |a DE-703 |a DE-739 | ||
084 | |a QP 345 |0 (DE-625)141866: |2 rvk | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Laurent, Maryline |0 (DE-588)1074435826 |4 edt | |
245 | 1 | 0 | |a Digital identity management |c edited by Maryline Laurent, Samia Bouzefrane |
264 | 1 | |a London |b ISTE Press |c 2015 | |
264 | 1 | |a Oxford |b Elsevier | |
300 | |a XV, 250 Seiten |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Identitätsverwaltung |0 (DE-588)7546673-9 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Bouzefrane, Samia |4 edt | |
856 | 4 | 2 | |m Digitalisierung UB Bamberg - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027942822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-027942822 |
Datensatz im Suchindex
_version_ | 1804153251713515520 |
---|---|
adam_text | Contents
Foreword............................................. ix
List of Acronyms..................................... xiii
Chapter 1. Digital Identity..........................
Maiyline Laurent, Julie Denouël, Claire Levallois-Barth and
Patrick Waelbroeck
LI. Introduction......................................................... 1
1.2. The social dimension of online self-representation.................. 3
1.2.1. Digital identity: at the crossroads of
platform configuration and internet user tactics....................... 3
L2.2. Different approaches............................................. 5
1.3. Socio-economic dimension............................................ 9
1.3.1. introduction................................................... 10
1.3.2. Digital identities: two sociological approaches................ 13
L3.3. Economic approaches............................................. 17
1.3.4. Conclusion..................................................... 26
1.4. Technological dimension.......................................... 27
1.4.1. Important notions.............................................. 31
1.4.2. The various digital identifiers................................ 32
1.4.3. Digital identity management.................................... 33
1.4.5. The norms...................................................... 37
1.4.6. The risks related to digital identity.......................... 38
1.5. Conclusions........................................................ 39
1.6. Bibliography....................................................... 40
vi Digital Identity Management
Chapter 2. The Management of Identity
by the Federation.......................................................... 47
Augustin De Miscault
2.1. The fundamentals of the identity federation........................ 47
2.1.1. Identity: a set of personal attributes......................... 47
2.1.2. Identity federation: propagating identity...................... 48
2.1.3. The concepts of identity federation............................ 48
2.1.4. Trust: a prerequisite for identity federation.................. 51
2.1.5. Stakeholders in identity federation................................ 52
2.2. The technical limitations of solutions
before identity federation.................................................. 53
2.2.1. Using WebSSO beyond a DNS domain............................... 54
2.2.2. Propagating user identity for the needs
of web-services........................................................... 61
2.3. The use value of identity federation............................... 66
2.3.1. Identity federation catalysts...................................... 66
2.3.2. Use cases for identity federation.................................. 67
2.3.3. Accessing applications in SaaS mode................................ 67
2.3.4. Exchange between trading
partners and subsidiaries................................................. 73
2.3.5. Public sphere: register with and access
an application in three steps............................................ 76
2.4. SAML 2.0 and OAuth 2.0: de facto standards
of identity federation..................................................... 80
2.4.1. SAML 2.0........................................................... 81
2.4.2. OAuth 2.0: accessing a resource on
behalf of a user......................................................... 85
2.5. Conclusion............................................................ 92
2.6. Bibliography.......................................................... 93
Chapter 3. Authentication Systems............................................. 95
Christophe KiENNERT, Sarnia Bouzefrane and Pascal Thoniel
3.1. Introduction.......................................................... 95
3.1.1. Authentication: definition and key issues......................... 96
3.1.2. Individual authentication factors................................. 98
3.1.3. Basic security in network protocols............................... 99
3.1.4. Cryptography principles........................................... 102
3.2. Principal authentication systems...................................... 106
3.2.1. Static password authentication systems............................ 106
3.2.2. Challenge-response authentication systems......................... 109
3.2.3. OTP authentication systems..................................... 113
Contents vii
3.2.4. Biometric authentication systems........................... 118
3.2.5. The TLS protocol........................................... 120
3.2.6. The role of smart cards.................................... 125
3.3. Authentication in identity management systems................. 126
3.3.1. Components of identity management systems.................. 127
3.3.2. Key players in identity management......................... 129
3.3.3. Internet trends in identity management..................... 131
3.4. Conclusion...................................................... 132
3.5. Bibliography.................................................... 133
Chapter 4. Privacy Management and
Protection of Personal Data............................................. 137
Maryline Laurent and Claire Levallois-Barth
4.1. Introduction.................................................... 137
4.2. Risks in information technology................................. 138
4.2.1. Ambient intelligence......................................... 138
4.2.2. Communications and services................................. 140
4.2.3. Social networks.............................................. 141
4.3. Legal elements relating to the creation,
collection, use and sharing of personal data....................... 143
4.3.1. Scope of application......................................... 145
4.3.2. Key principles............................................... 151
4.3.3. Sanctions and prejudice to brand image....................... 164
4.4. Technical solutions for privacy and
personal data protection............................................. 167
4.4.1. Increasing control over ambient intelligence................. 167
4.4.2. Communication anonymization solutions........................ 171
4.4.3. Personal data protection tools for transactions.............. 176
4.5. Research themes................................................. 184
4.5.1. Development of simple, evolutive
“construction block” tools.......................................... 185
4.5.2. Management of personal attributes............................ 190
4.5.3. Negotiation of contract terms
regarding privacy................................................... 192
4.5.4. Reforms to the European
data protection rules............................................... 194
4.6. Conclusions..................................................... 199
4.7. Bibliography.................................................... 200
viii Digital Identity Management
Chapter 5. Digital Identity in Cloud Computing 207
Christophe Kiennert, Sarnia Bouzefrane and
Amira Faiza Benkara Mostefa
5.1. Introduction.................................................... 2G7
5.2. Concepts of cloud computing....................................... 207
5.2.1. Definition of cloud computing............................... 207
5.2.2. Principles of cloud computing............................... 208
5.2.3. Deployment models for cloud computing....................... 208
5.2.4. Properties of cloud computing............................... 210
5.2.5. Advantages of cloud computing............................... 211
5.3. Other key characteristics of cloud computing.................... 212
5.3.1. Cloud computing services...................................... 212
5.3.2. Actors in cloud computing..................................... 214
5.3.3. Key issues.................................................... 216
5.3.4. Intercloud interactions....................................... 217
5.3.5. Cloud computing and digital identity.......................... 218
5.3.6. Beyond digital identity in the cloud.......................... 219
5.4. Classic solutions for digital identity
management in the cloud.............................................. 219
5.4.1. Client-cloud interactions..................................... 220
5.4.2. intercloud interactions....................................... 224
5.4.3. Limitations of classic identity
management solutions in the cloud.................................. 227
5.5. Alternative solutions for digital
identity management in the cloud..................................... 228
5.5.1. Identity as a Service....................................... 228
5.5.2. Authentication as a Service................................. 230
5.6. Management of privacy and personal
data in cloud computing.............................................. 233
5.6.1. Identity federation and management
of personal data.................................... 234
5.6.2. Solutions for privacy protection in the cloud................. 237
5.7. Conclusion........................................................ 740
5.8. Bibliography............................... 74 j
List of Authors.................................... 245
Index........................................ 247
|
any_adam_object | 1 |
author2 | Laurent, Maryline Bouzefrane, Samia |
author2_role | edt edt |
author2_variant | m l ml s b sb |
author_GND | (DE-588)1074435826 |
author_facet | Laurent, Maryline Bouzefrane, Samia |
building | Verbundindex |
bvnumber | BV042508249 |
classification_rvk | QP 345 ST 277 |
ctrlnum | (OCoLC)915140149 (DE-599)BVBBV042508249 |
discipline | Informatik Wirtschaftswissenschaften |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01366nam a2200349 c 4500</leader><controlfield tag="001">BV042508249</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190207 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">150417s2015 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781785480041</subfield><subfield code="9">978-1-78548-004-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)915140149</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042508249</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-473</subfield><subfield code="a">DE-M382</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">QP 345</subfield><subfield code="0">(DE-625)141866:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Laurent, Maryline</subfield><subfield code="0">(DE-588)1074435826</subfield><subfield code="4">edt</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Digital identity management</subfield><subfield code="c">edited by Maryline Laurent, Samia Bouzefrane</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">London</subfield><subfield code="b">ISTE Press</subfield><subfield code="c">2015</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Oxford</subfield><subfield code="b">Elsevier</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XV, 250 Seiten</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Identitätsverwaltung</subfield><subfield code="0">(DE-588)7546673-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bouzefrane, Samia</subfield><subfield code="4">edt</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Bamberg - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027942822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027942822</subfield></datafield></record></collection> |
id | DE-604.BV042508249 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:23:38Z |
institution | BVB |
isbn | 9781785480041 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027942822 |
oclc_num | 915140149 |
open_access_boolean | |
owner | DE-473 DE-BY-UBG DE-M382 DE-703 DE-739 |
owner_facet | DE-473 DE-BY-UBG DE-M382 DE-703 DE-739 |
physical | XV, 250 Seiten Illustrationen |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | ISTE Press Elsevier |
record_format | marc |
spelling | Laurent, Maryline (DE-588)1074435826 edt Digital identity management edited by Maryline Laurent, Samia Bouzefrane London ISTE Press 2015 Oxford Elsevier XV, 250 Seiten Illustrationen txt rdacontent n rdamedia nc rdacarrier Identitätsverwaltung (DE-588)7546673-9 gnd rswk-swf Identitätsverwaltung (DE-588)7546673-9 s DE-604 Bouzefrane, Samia edt Digitalisierung UB Bamberg - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027942822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Digital identity management Identitätsverwaltung (DE-588)7546673-9 gnd |
subject_GND | (DE-588)7546673-9 |
title | Digital identity management |
title_auth | Digital identity management |
title_exact_search | Digital identity management |
title_full | Digital identity management edited by Maryline Laurent, Samia Bouzefrane |
title_fullStr | Digital identity management edited by Maryline Laurent, Samia Bouzefrane |
title_full_unstemmed | Digital identity management edited by Maryline Laurent, Samia Bouzefrane |
title_short | Digital identity management |
title_sort | digital identity management |
topic | Identitätsverwaltung (DE-588)7546673-9 gnd |
topic_facet | Identitätsverwaltung |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027942822&sequence=000002&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT laurentmaryline digitalidentitymanagement AT bouzefranesamia digitalidentitymanagement |