Open Access
Subscription Access
Online Identity Management Techniques: Identification and Analysis of Flaws and Standard Methods
Cyberspace, and the technologies that enable it, allow people of every nationality, race and point of view to communicate, cooperate, and prosper like never before. Today as nations and people use the networks that are all around us, everyone has to work together to realize the potential for greater prosperity and security or we will succumb to narrow interests and undue fears that limit progress. Internet is one of the best examples of a self organized community as society, academia, private sector and government work together for its effective management. We have to build a cyberspace which is open, interoperable, secure and trustworthy. We have studied the related literature and in this paper, we present and discuss the flaws identified in the Identity Management processes. We also discuss the techniques which are proposed or implemented for the online Identity Management. A special attention is also given to the implementation perspective of the proposed Trust Model for India.
Keywords
Identity Management, Online Identity, Privacy
User
Font Size
Information
Abstract Views: 134
PDF Views: 0