2020
DOI: 10.24251/hicss.2020.785
|View full text |Cite
|
Sign up to set email alerts
|

The Review of Non-Technical Assumptions in Digital Identity Architectures

Abstract: The literature on digital identity management systems (IdM) is abundant and solutions vary by technology components and non-technical requirements. In the long run, however, there is a need for exchanging identities across domains or even borders, which requires interoperable solutions and flexible architectures. This article aims to give an overview of the current research on digital identity management. We conduct a systematic literature review of digital identity solution architectures and extract their inh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 34 publications
0
5
0
Order By: Relevance
“…We also conducted an industrial survey regarding the integration of agile practices into software architectural assumption management [34]. Bazarhanova and Smolander [3] performed a review on assumptions, while their scope was limited to non-technical assumptions (i.e., interplay between technology and business, inter-organizational aspects, and governance) in digital identity management systems. Xiong et al [31] conducted an exploratory study on assumptions in open source software development.…”
Section: Assumptions In Software Developmentmentioning
confidence: 99%
See 1 more Smart Citation
“…We also conducted an industrial survey regarding the integration of agile practices into software architectural assumption management [34]. Bazarhanova and Smolander [3] performed a review on assumptions, while their scope was limited to non-technical assumptions (i.e., interplay between technology and business, inter-organizational aspects, and governance) in digital identity management systems. Xiong et al [31] conducted an exploratory study on assumptions in open source software development.…”
Section: Assumptions In Software Developmentmentioning
confidence: 99%
“…After discussion, we decided to classify it into the design category, since the "tensor and variable" category is regarding the tensors and variables themselves instead of using or processing them in certain context. (3) The first author analyzed the remaining 1055 SCAs (out of 3084, 34.21%) following the same process used in the pilot data analysis, i.e., (a) coded the SCAs, (b) compared the codes to generate concepts, and (c) compared the codes and concepts to generate categories in multiple iterations. All the other authors reviewed and discussed the results.…”
Section: Data Extraction and Analysismentioning
confidence: 99%
“…Once the SP Proxy receives the eIDAS-Auth-Res (step 14), it translates it to SPID format. Thus, the SP Proxy prepares the SPID-Auth-Res and sends it back through the user browser to the Login service (steps [15][16]. Finally, the Login Service extracts from the SPID-Auth-Res the value of the spidCode attribute, which contains an eIDAS PersonIdentifier value and checks it against the eIDAS PersonIdentifier value stored in the Polito user profile.…”
Section: Implementation Details A: Eidas (Person) Identifier Regismentioning
confidence: 99%
“…Content may change prior to final publication. eIDAS application sends the temporary guest account name and password via the user browser to the Cisco WLC (steps [15][16]. Finally, if a match is found among the temporary guest accounts created, then Cisco WLC grants Internet access to the user's device (step 17), otherwise the network access is denied (step 18).…”
Section: B Implementation Detailsmentioning
confidence: 99%
See 1 more Smart Citation