Abstract
Internet identity management (IIDM), which is a core issue of network security, has drawn close attention from governments and IT experts all over the world. This article makes a worldwide review on the development status of IIDM at first. Then a new definition of trusted IIDM is brought forward. As a realization of the concept, we represent a creative design of IIDM mode, as well as a technique solution of online information system introducing biometrics. Our study is innovative and valuable on the research and application of IIDM.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Full NSTIC Strategy Document, http://www.nist.gov/nstic/
i2010 eGovernment Action Plan, http://europa.eu/
Kubicek, H.: Introduction: conceptual framework and research design for a comparative analysis of national eID Management Systems in selected European countries. Identity in the Information Society, 5–26 (March 2010)
Mariën, I., van Audenhove, L.: The Belgian e-ID and its complex path to implementation and innovational change. Identity in the Information Society, 27–41 (March 2010)
Heichlinger, A., Gallego, P.: A new e-ID card and online authentication in Spain. Identity in the Information Society, 43–64 (March 2010)
Aichholzer, G., Strauß, S.: The Austrian case: multi-card concept and the relationship between citizen ID and social security cards. Identity in the Information Society, 65–85 (March 2010)
Noack, T., Kubicek, H.: The introduction of online authentication as part of the new electronic national identity card in Germany. Identity in the Information Society, 87–110 (March 2010)
Grönlund, Å.: Electronic identity management in Sweden:governance of a market approach. Identity in the Information Society, 195–211 (March 2010)
Rissanen, T.: Electronic identity in Finland: ID cards vs. bank IDs. Identity in the Information Society, 175–194 (March 2010)
e-Japan Strategy, http://www.kantei.go.jp/
Chen, B., Zou, X., Zhou, G.: The Development Trend of the Network Identity Management. Netinfo Security, 5–8 (March 2011)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Han, B., Chai, Y., Liu, Y. (2012). A Study on Trusted Internet Identity Management and Its Application. In: Jin, D., Lin, S. (eds) Advances in Electronic Engineering, Communication and Management Vol.1. Lecture Notes in Electrical Engineering, vol 139. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-27287-5_76
Download citation
DOI: https://doi.org/10.1007/978-3-642-27287-5_76
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-27286-8
Online ISBN: 978-3-642-27287-5
eBook Packages: EngineeringEngineering (R0)