PhD thesis,

Persönliches digitales Identitätsmanagement

.
Universität Hamburg, Fachbereich Informatik, Verteilte Systeme und Informationssysteme, (June 2005)Tweet vom 29.08..

Abstract

Digital identity management helps users and service providers to manage, control and transmit personal data within digital communication systems. The diversity of these complex tasks that always involve security issues, is currently distributed on many different applications and systems. Digital identity management ties these tasks into one single concept for a system level component which can be utilized by other communication applications. A common user interface helps with the management of the information as well as with the transmission of personal data to communication partners. In contrast to organisational, identity management personal identity management puts the user into control of his data. This influences both the system architecture and the possible application context. Nevertheless, both share many concepts and mechanisms which will be considered conjointly in this work. First the fundamental concepts of digital identity management are explained, which leads to definitions of identity, identity management and identity management systems. Then a classification of identity management systems is introduced. It differs from former approaches by considering the intention and thereby the target group of the system.With it, the functional differences between organisational and personal identity management systems become apparent. After applying this classification to important identity management systems which are currently developed and even deployed by commercial industry and research, it becomes clear that there is a gap: there is no personal digital identity management system which concentrates on self-portrayal instead of data security. This leads to this works main goal: the development of a concept for self-portrayal oriented digital identity management. A prototype following this concept is also introduced. Practical examples show how the prototype is used and what difference it makes to existing communication systems. Finally, the system is classified itself and its position in the field is elaborated.

Tags

Users

  • @dawinci

Comments and Reviewsshow / hide

  • @esistimfluss
    10 years ago
    Bereiche Identitätsmanagement, Datenschutz und Selbstdarstellungsmöglichkeit
Please log in to take part in the discussion (add own reviews or comments).