Abstract
The rise of network-based, automated services has brought some fundamental changes to every organization’s activities. One of the most important changes that have occurred is the change in the way the business companies offered their products to customers. The business processes have become increasingly automated. As a result, the way in which customers create trust relationships with service providers has changed, because business transactions are conducted online. Traditional ways of establishing trust relationships between negotiating parties are no longer applicable. Windley (2005) points out that the usual trust marks that customers have relied on in the past are either missing or are easily forged. Moreover, in addition to changes in the relationship between business companies and their customers, the whole business process has become automated. The relationships with partners, suppliers, and employees have moved to the electronic world. This leads to increased risk of attacks such as identity theft and identity disclosure. Merchant web applications must be properly protected in an e-commerce environment (Stanković et al., 2012). Therefore, digital identity management needs to be properly implemented in order to elevate the overall security of the business process.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Al-Khouri, A.M. (2012). PKI in government digital identity management systems, European Journal of ePractice, n◦ 15.
Barisch, M. (2011). Design and evaluation of an architecture for ubiquitous user authentication based on identity management systems. Paper presented on International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.
Elliot, J., Ford, M., & Birch, D. (2011). Managing multiple electronic identities. Retrieved www.enisa.europe.eu .
García, S.S., Gómez, O.A., & Pérez, E.B. (2012). Is Europe ready to provide a pan-European identity management system?. Accepted for publication in IEEE Security and Privacy.
Hermans, J., & Valkenburg, P. (2009). European identity and access management survey. KPMG and Everett. Retrieved from http://www.everett.it.
Jovičić, B., & Simić, D. (2006). Common web application attack types and security using ASP.NET, Computer Science and Information Systems, 3(2), ISSN 1820–0214, 83–96.
Kostrešević, M., & Simić, D. (2011). Security measures for protection of e-Government IT infrastructure, TTEM — Technics, Technologies, Education, Management, 6(3), ISSN 1840–1503, 801–810.
Lazović, M., & Simić, D. (2011). Botnets: the evolution and possible solution, TTEM — Technics, Technologies, Education, Management, 6(3), ISSN 1840–1503, 829–835.
Milenković, I., Šošević, U., & Simić, D. (2012). Architectures of comprehensive identity and access management, Paper presented at Electronic International Interdisciplinary Conference.
Pfitzman, A.(2001). Multilateral security: enabling technologies and their evaluation, in R. Wilhelm (ed.), Informatics-10 Years Back, 10 Years Ahead, LNCS 2000, Springer, Heidelberg, 50–62.
Prasad, G., & Rajbhandari, U. (2011). Identity management on a shoestring. Retrieved from http://www.infoq.com/minibooks/Identity-Management-Shoestring.
Prodanović, R., & Simić, D. (2006). Holistic approach to WEP protocol in securing wireless network infrastructure, Computer Science and Information Systems, 3(2), ISSN 1820–0214, 97–113.
Savić, D., Simić, D., & Vlajić, S. (2010). Extended software architecture based on security patterns, Informatica, International Journal, 21(2), ISSN 0868–4952, 229–246.
Senk, C, & Dotzler, F. (2011). Biometric authentication as a service for enterprise identity management deployment. Paper presented at Sixth International Conference on Avaliability, Reliability and Security.
Stanković, S., Simić, D., & Nenadović, G. (2012). Merchant web applications defense in e-commerce enviroment, Information Journal, published by International Information Institute in Tokyo, 15(8), ISSN 1343–4500, 3301–3312.
Šućurović, S., & Simić, D. (2010). An approach to access control in electronic health record, Journal of Medical Systems, 34(4), 659–666, Springer Netherlands, doi 10.1007/s10916-009-9279-4, ISSN 0148-5598.
Trikoš, M., & Simić, D. (2011). Providing strong access control in campus computer network by using RADIUS server, TTEM — Technics, Technologies, Education, Management, 6(2), ISSN 1840–1503, 482–488.
United Nations — Division for Public Administration and Development Management (2012). E-Government Survey (2012). Retrieved from http://www2.unpan.org/ego-vkb/global_reports/12report.htm.
Bertocci, V., et al. (2008) Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities. Addison-Wesley Longman.
Windley, P., (2005). Digital Identity, Sebastopol, USA: O’Reilly.
Yuan Cao (2010). A survey of identity management technology. Paper presented at Information Theory and Information Security (ICITIS), 2010 IEEE International Conference.
Editor information
Editors and Affiliations
Copyright information
© 2014 Marija Bogićević, Ivan Milenković, and Dejan Simić
About this chapter
Cite this chapter
Bogićević, M., Milenković, I., Simić, D. (2014). Identity Management — A Survey. In: Jakšić, M.L., Rakočević, S.B., Martić, M. (eds) Innovative Management and Firm Performance. Palgrave Macmillan, London. https://doi.org/10.1057/9781137402226_19
Download citation
DOI: https://doi.org/10.1057/9781137402226_19
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-48666-3
Online ISBN: 978-1-137-40222-6
eBook Packages: Palgrave Business & Management CollectionBusiness and Management (R0)