Abstract

On behalf of the DIM Program Committee, we are very pleased to welcome you to the Second ACM Workshop on Digital Identity Management - DIM 2006, held in conjunction with the 13th ACM Conference on Computer and Communications Security, CCS2006.The Second Workshop on Digital Identity Management will explore the relevance of User Centric Identity Management as an organizing principle for digital identity. It is designed to bring together practitioners, corporate researchers and academics to explore the newly emerging "User Centric" technologies for identity management.Our society is facing challenges that lead us to consider fundamental changes in managing identities, the global scale deployment of stronger authentication and privacy protection beyond simple password and patched-work solutions. User centric identity management is currently viewed as a useful high-level organizing principle for designing solutions to meet these challenges and is being actively pursued both in industry and academia.User centric identity shifts the focus from domain-centric identity management to the users themselves, giving them greater flexibility in how and where they store their identities, control over how those identities are used and shared, and stronger assurances of good privacy. Despite the acceptance of the value of user-centric technologies, there is no universally recognized set of criteria by which user-centrism can be measured. For some, the term means identity hosted on the client, for others it means giving the user more options as to where on the network they store their identity, etc.The goal of the workshop is to lay the foundation and agenda for further research and development in this area, from theoretical analysis to real-world experience, to share the knowledge obtained to date, and to propose an agenda for further research.The call for papers attracted 21 submissions from Asia, Europe, and North America. The program committee accepted 9 papers that cover a variety of topics, including basic frameworks for the user-centric identity management, implementation issues and applications. We hope that these proceedings will serve as a valuable reference for security researchers and developers.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call