Jan. 3, 2023, 2:10 a.m. | Daniela Pöhn, Wolfgang Hommel

cs.CR updates on arXiv.org arxiv.org

This paper presents a comprehensive classification of identity management
approaches. The classification makes use of three axes: topology, type of user,
and type of environment. The analysis of existing approaches using the
resulting identity management cube (IMC) highlights the trade-off between user
control and trust in attributes. A comparative analysis of IMC and established
models identifies missing links between the approaches. The IMC is extended by
a morphology of identity management, describing characteristics of cooperation.
The morphology is then mapped …

analysis attributes classification control cube environment identity identity management management trade trust

Senior Security Officer

@ eSimplicity | Remote

Senior - Automated Cyber Attack Engineer

@ Deloitte | Madrid, España

Public Key Infrastructure (PKI) Senior Engineer

@ Sherwin-Williams | Cleveland, OH, United States

Consultant, Technology Consulting, Cyber Security - Privacy (Senior) (Multiple Positions) (1502793)

@ EY | Chicago, IL, US, 60606

Principal Associate, CSOC Analyst

@ Capital One | McLean, VA

Real Estate Portfolio & Corporate Security Lead

@ Lilium | Munich