2011
DOI: 10.1007/978-3-642-20769-3_14
|View full text |Cite
|
Sign up to set email alerts
|

A Smart Card Based Solution for User-Centric Identity Management

Abstract: Abstract. This paper presents a prototype of a previously proposed user-centric identity management system using trusted modules. The trusted module, implemented using a smart card, can retrieve user attributes from identity providers and offer them to service providers, after authentication. This paper allows an evaluation of the practical feasibility of the identity management architecture and provides insight in several design decisions made during the prototype implementation. Also, the cryptographic proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
4
1

Relationship

3
2

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 12 publications
0
3
0
Order By: Relevance
“…This section first matches the solution with the requirements defined before, followed by a discussion on the overall functionality and possible extensions. For an in-depth evaluation of a prototype implementation on a smart card, we refer to [18]. [18] demonstrates the practical feasibility of the proposed architecture, presents concrete protocols that realize the security and privacy requirements and provides insight in the most important design decisions made during the instantiation of the architecture.…”
Section: Discussionmentioning
confidence: 99%
“…This section first matches the solution with the requirements defined before, followed by a discussion on the overall functionality and possible extensions. For an in-depth evaluation of a prototype implementation on a smart card, we refer to [18]. [18] demonstrates the practical feasibility of the proposed architecture, presents concrete protocols that realize the security and privacy requirements and provides insight in the most important design decisions made during the instantiation of the architecture.…”
Section: Discussionmentioning
confidence: 99%
“…Software components for these modules are typically developed using the Java-Card subset of the Java programming language. This facilitates portability of the the proof-of-concept from [14] to the mobile phone, as it is also developed using the same technology.…”
Section: Trusted Module Applicationmentioning
confidence: 99%
“…All issued cards will share a common authentication key pair (SK co , PK co ) (cfr. also [15] for the rationale behind this privacy-friendly identity card). The card is necessary to authenticate the base station towards the dispatching center and the caregivers, and to sign or decrypt information.…”
Section: User Registrationmentioning
confidence: 99%