Abstract
Identity Management systems are used for securing digital identity of users in reliable, automated and compatible way. Service providers employ identity management systems which are cost effective and scalable but cause poor usability for users. Identity management systems are user-centric applications which should be designed by considering users’ perspective. User centricity is a remarkable concept in identity management systems as it provides more powerful user control and privacy. This approach has been evolved from amending past paradigms. Thus, evaluation of digital identity management systems based on users’ point of view, is really important. The main objective of this paper is to identify the appropriateness of the criteria used in evaluation of user-centric digital identity management systems. These criteria are gathered from the literature and then categorized into four groups for the first time in this work to examine the importance of each parameter. In this approach, several interviews were performed as a qualitative research method and two questionnaires have been filled out by forty six users who were involved with identity management systems. Since the answers are perception based data the most important criteria in each category are assessed by using fuzzy method. This research found that the most important criteria are related to security category. The results of this research can provide valuable information for managers and decision makers of hosting companies as well as system designers to adapt and develop appropriate user-centric digital identity management systems.
Highlights
In today’s Information Systems, users have various compounds of login-name and password for every online service or even distinct credentials for different roles inside the services which are available for them
Results of fuzzy Analytical Hierarchy Process (AHP) approach for prioritizing the evaluation criteria are presented
Transformation of Identity Management Systems can be in the range of development of silo models to federated user-centric identity management models
Summary
In today’s Information Systems, users have various compounds of login-name and password for every online service or even distinct credentials for different roles inside the services which are available for them. This can result in privacy risk for end-users and jeopardize service providers by security threats. In Single Sign-On (SSO) solution, the user authenticates him or herself only once and it is very similar to the federated identity scenario as the same identifier of the user is automatically used by each service provider when the user logged into. Capturing the information of authentication and identification by system and giving the user access to services is the functionality of single sign-on systems [29]
Published Version (Free)
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Advanced Computer Science and Applications
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.