Enabling user control with personal identity management

Ty Mey Eap, Marek Hatala, Dragan Gašević

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

12 Citations (Scopus)


Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breaches can happen and no identity management system can provide full-proof security. The challenge is even greater in service-oriented architectures where each user has their identities scattered across many services and has no control over management of those identities. Recent research in the area of the user-centric identity management makes user control and consent the key concept for identity management, but there is no consensus on the level of user-centricity. This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities. The advantages of this proposal can be demonstrated through a comparison analysis of relevant identity management systems against a set of criteria required for today's identity management.

Original languageEnglish
Title of host publicationProceedings - 2007 IEEE International Conference on Services Computing, SCC 2007
PublisherIEEE, Institute of Electrical and Electronics Engineers
Number of pages8
ISBN (Print)0769529259, 9780769529257
Publication statusPublished - 2007
Externally publishedYes
Event2007 IEEE International Conference on Services Computing, SCC 2007 - Salt Lake City, UT, United States of America
Duration: 9 Jul 200713 Jul 2007


Conference2007 IEEE International Conference on Services Computing, SCC 2007
Country/TerritoryUnited States of America
CitySalt Lake City, UT

Cite this