Skip to main content

Abstract

The rise of network-based, automated services has brought some fundamental changes to every organization’s activities. One of the most important changes that have occurred is the change in the way the business companies offered their products to customers. The business processes have become increasingly automated. As a result, the way in which customers create trust relationships with service providers has changed, because business transactions are conducted online. Traditional ways of establishing trust relationships between negotiating parties are no longer applicable. Windley (2005) points out that the usual trust marks that customers have relied on in the past are either missing or are easily forged. Moreover, in addition to changes in the relationship between business companies and their customers, the whole business process has become automated. The relationships with partners, suppliers, and employees have moved to the electronic world. This leads to increased risk of attacks such as identity theft and identity disclosure. Merchant web applications must be properly protected in an e-commerce environment (Stanković et al., 2012). Therefore, digital identity management needs to be properly implemented in order to elevate the overall security of the business process.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  • Al-Khouri, A.M. (2012). PKI in government digital identity management systems, European Journal of ePractice, n 15.

    Google Scholar 

  • Barisch, M. (2011). Design and evaluation of an architecture for ubiquitous user authentication based on identity management systems. Paper presented on International Joint Conference of IEEE TrustCom-11/IEEE ICESS-11/FCST-11.

    Google Scholar 

  • Elliot, J., Ford, M., & Birch, D. (2011). Managing multiple electronic identities. Retrieved www.enisa.europe.eu .

  • García, S.S., Gómez, O.A., & Pérez, E.B. (2012). Is Europe ready to provide a pan-European identity management system?. Accepted for publication in IEEE Security and Privacy.

    Google Scholar 

  • Hermans, J., & Valkenburg, P. (2009). European identity and access management survey. KPMG and Everett. Retrieved from http://www.everett.it.

  • Jovičić, B., & Simić, D. (2006). Common web application attack types and security using ASP.NET, Computer Science and Information Systems, 3(2), ISSN 1820–0214, 83–96.

    Article  Google Scholar 

  • Kostrešević, M., & Simić, D. (2011). Security measures for protection of e-Government IT infrastructure, TTEM — Technics, Technologies, Education, Management, 6(3), ISSN 1840–1503, 801–810.

    Google Scholar 

  • Lazović, M., & Simić, D. (2011). Botnets: the evolution and possible solution, TTEM — Technics, Technologies, Education, Management, 6(3), ISSN 1840–1503, 829–835.

    Google Scholar 

  • Milenković, I., Šošević, U., & Simić, D. (2012). Architectures of comprehensive identity and access management, Paper presented at Electronic International Interdisciplinary Conference.

    Google Scholar 

  • Pfitzman, A.(2001). Multilateral security: enabling technologies and their evaluation, in R. Wilhelm (ed.), Informatics-10 Years Back, 10 Years Ahead, LNCS 2000, Springer, Heidelberg, 50–62.

    Google Scholar 

  • Prasad, G., & Rajbhandari, U. (2011). Identity management on a shoestring. Retrieved from http://www.infoq.com/minibooks/Identity-Management-Shoestring.

  • Prodanović, R., & Simić, D. (2006). Holistic approach to WEP protocol in securing wireless network infrastructure, Computer Science and Information Systems, 3(2), ISSN 1820–0214, 97–113.

    Article  Google Scholar 

  • Savić, D., Simić, D., & Vlajić, S. (2010). Extended software architecture based on security patterns, Informatica, International Journal, 21(2), ISSN 0868–4952, 229–246.

    Google Scholar 

  • Senk, C, & Dotzler, F. (2011). Biometric authentication as a service for enterprise identity management deployment. Paper presented at Sixth International Conference on Avaliability, Reliability and Security.

    Google Scholar 

  • Stanković, S., Simić, D., & Nenadović, G. (2012). Merchant web applications defense in e-commerce enviroment, Information Journal, published by International Information Institute in Tokyo, 15(8), ISSN 1343–4500, 3301–3312.

    Google Scholar 

  • Šućurović, S., & Simić, D. (2010). An approach to access control in electronic health record, Journal of Medical Systems, 34(4), 659–666, Springer Netherlands, doi 10.1007/s10916-009-9279-4, ISSN 0148-5598.

    Article  Google Scholar 

  • Trikoš, M., & Simić, D. (2011). Providing strong access control in campus computer network by using RADIUS server, TTEM — Technics, Technologies, Education, Management, 6(2), ISSN 1840–1503, 482–488.

    Google Scholar 

  • United Nations — Division for Public Administration and Development Management (2012). E-Government Survey (2012). Retrieved from http://www2.unpan.org/ego-vkb/global_reports/12report.htm.

  • Bertocci, V., et al. (2008) Understanding Windows Cardspace: An Introduction to the Concepts and Challenges of Digital Identities. Addison-Wesley Longman.

    Google Scholar 

  • Windley, P., (2005). Digital Identity, Sebastopol, USA: O’Reilly.

    Google Scholar 

  • Yuan Cao (2010). A survey of identity management technology. Paper presented at Information Theory and Information Security (ICITIS), 2010 IEEE International Conference.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 Marija Bogićević, Ivan Milenković, and Dejan Simić

About this chapter

Cite this chapter

Bogićević, M., Milenković, I., Simić, D. (2014). Identity Management — A Survey. In: Jakšić, M.L., Rakočević, S.B., Martić, M. (eds) Innovative Management and Firm Performance. Palgrave Macmillan, London. https://doi.org/10.1057/9781137402226_19

Download citation

Publish with us

Policies and ethics