StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Model for Integrating Physical and Virtual Identity Management Systems - Thesis Example

Cite this document
Summary
The researcher of this essay will make an earnest attempt at identifying and evaluating a model for integrating physical and virtual identity management systems. The researcher of this essay aims to analyze suitable attributes for interoperable identity management systems…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
Model for Integrating Physical and Virtual Identity Management Systems
Read Text Preview

Extract of sample "Model for Integrating Physical and Virtual Identity Management Systems"

Download file to see previous pages

This research will begin with the presentation of theories in the field of security and identity. Secure authentication protocol for the multi-server environment using dynamic ID. This theory relies on the nonce-based (a value or counter) mechanism rather than timestamp. The authentication key of the user is based on two factors such that the theft of one cannot be used to recreate the other, thereby improving the level of security. The theft of the past session key cannot serve to provide access to any individual twice since the key is nonce-based and unique every time.

User anonymity is protected with the dynamicity of the variables of the login session. The user Ui sends the following login message to the desired server Sj: (CIDi, Pij, Qi, Ni) where CIDi is the dynamic and ID of Ui, Pij and Qij are nonce-based variables and Ni is the nonce value. The above-mentioned variables are computed by hash functions in accordance with the uniquely generated nounce. This technique not only provides a unique session but also hides the identity of the user.  Its attributes: Two-factor authentication; Single registration for multi-server access; User anonymity; Avoidance of time-synchronization problem.

These authors have not implemented their approach in the physical environments; however, the attributes of their theory seem effective enough to facilitate a secure service in multi-server environments.. Several laws and security measures are deployed to protect the identity of individuals in the physical world but minimal efforts have been witnessed for the provision of such laws in online spaces. Control of personal information Clear mapping between physical and virtual identity Conceal information This theory is relevant since it provides an individual certain rights to control the exposure of his personal information.

This enhances the level of privacy and security of the data. The authors explain the implementation of the concept of e-ID federation which provides access across multiple platforms [21]. e-ID federation implements a security token service (STS) that is based on the Windows Identity Framework. The authentication mechanism is based on security certificates, login forms, Windows Authentication and OpenID credentials [22]. A common platform is established by the STS that can be accessed by different sources to authenticate the individuals.

The interoperability takes place on an intermediate layer that serves as an abstraction of the authentication mechanism. The federated authentication mechanism of STS can be seen in Appendix A.2 Security certificates OpenID credentials WS Federation Specification The STS authentication mechanism has been explained in a comprehensive manner with the aid of a diagram. Windows Identity framework can serve as the basis of the authentication mechanism for the chosen research study. Perspectives Theory name Definition of the theory The reason for selecting this theory Its attributes If the theory and attributes can be applied in virtual or physical environments Acceptability and

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Model for Integrating Physical and Virtual Identity Management Systems Thesis”, n.d.)
Retrieved de https://studentshare.org/information-technology/1391385-model-integrating-physical-virtual-identity-management-systems
(Model for Integrating Physical and Virtual Identity Management Systems Thesis)
https://studentshare.org/information-technology/1391385-model-integrating-physical-virtual-identity-management-systems.
“Model for Integrating Physical and Virtual Identity Management Systems Thesis”, n.d. https://studentshare.org/information-technology/1391385-model-integrating-physical-virtual-identity-management-systems.
  • Cited: 0 times

CHECK THESE SAMPLES OF Model for Integrating Physical and Virtual Identity Management Systems

Virtual Machine Ware Project

The project is also expected to run multiple operating systems, create virtual PC environments, perform and run enterprise applications, built up enterprise desktop management and control.... In additional, the virtual systems should be able to construct business continuity by improving disaster recovery solutions and bringing forth excellent availability throughout the data zones.... Many operations like web hosting and e-mail management among others....
19 Pages (4750 words) Research Proposal

The Security of Access Management Systems

Modes of Authentication The security of access management systems are mainly based on three aspects [2], [12], [13]; Ownership-based factors (Something a user has) Knowledge-based factors (Something a user knows) Inherence-based factors (Something a person is) In other words, the different forms of security have been categorized into the above mentioned divisions.... Security is one of the most important aspects of an access management system since the login credentials of the users need to be safeguarded with effective security measures....
46 Pages (11500 words) Dissertation

Identifying and Evaluating a Framework for Integrating Physical and Virtual Identity Management Systems

hellip; Identifying and Evaluating a Framework for integrating physical and virtual identity management systems Abstract The extensive use of Identity Management Systems (IMSs) in virtual and physical environments has forced the increased need to remember several passwords and depending on the implementation a smart card may replace it for authentication purposes.... My research will define a conceptual framework for integrating physical and virtual identity management systems....
4 Pages (1000 words) Essay

The Virtual Reality

Virtual reality as illustrated by Kalawsky as: “Virtual environments are synthetic sensory experiences that communicate physical and abstract components to a human operator and participant.... The specific components such as head-coupled virtual images, stereoscopic displays, hap tic interfaces and position-tracking systems characterize virtual reality as a technological system.... The synthetic sensory experience is generated by a computer system that one day may present an interface to the human sensory systems that is indistinguishable from the real physical world” (Beutel,)....
9 Pages (2250 words) Research Paper

Investigation into Virtual Organisation Facilities

While decentralization may bring litheness and fast response to changing needs, it also makes systems integration difficult, presents' obstruction to standardization, and acts as a disincentive for achieving economies of scale (DeSanctis, 1994).... Coordination of IT management presents a real challenge to these firms which have to deal with detached, decentralized IT practices (DeSanctis, 1994).... This dissertation is related with the evolution of virtual Organization....
37 Pages (9250 words) Coursework

Virtual Tour Technology

There are several low- to mid-cost HMDs (InterSense's InterTrax i-glasses, Olympus Eye-Trek FMD, Interactive Imaging systems' VFX3D, Sony Cybermind, Sony Glasstron, and Kaiser ProViewXL) that are lightweight (approximately 39 g to 1,000 g) providing а true resolution of only about 60 K pixels.... There are several low- to mid-cost HMDs (InterSense's InterTrax i-glasses, Olympus Eye-Trek FMD, Interactive Imaging systems' VFX3D, Sony Cybermind, Sony Glasstron, and Kaiser ProViewXL) that are lightweight (approximately 39 g to 1,000 g) and provide horizontal field of view (30 to 35 degrees per eye) and resolution (180 K to 2....
22 Pages (5500 words) Essay

Asynchronous Transfer Mode Description and Development

ATM is primarily a protocol that is used in cell network relaying (IEC, 2005). ATM was originally conceived as a solution for completely integrating the entire set of communication technologies, starting from the Local Area Network to the IP based systems and the broad band voice and data communication systems.... ATM was proposed as the final and ultimate protocol to take care of all the requirements of all communication systems in the world....
20 Pages (5000 words) Essay

Community and Identity in Contemporary Physical and Virtual Spaces

The paper "Community and Identity in Contemporary physical and virtual Spaces" defined physical identity as the physical characteristics of the external attributes that are possessed by the individual and explain the advantage of the integration of physical with virtual services.... With respect to the definition by Woodworth [84], it can be stated that if the tools within the virtual spaces are used to authenticate the users on the basis of any proof of identity then it can be termed as a virtual identity....
5 Pages (1250 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us