The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.02 - March-April (2013 vol.11)
pp: 34-41
Jostein Jensen , Norwegian University of Science and Technology
Martin Gilje Jaatun , SINTEF ICT
ABSTRACT
Solutions for federated identity management (FIM) are maturing; however, the adoption rate of this technology hasn't been as high as expected. The authors conducted and analyzed eleven semistructured interviews with representatives from the Norwegian oil and gas industry to learn more about the perceived benefits and challenges of FIM adoption. Their results show that some benefits of FIM adoption are offset by its challenges.
INDEX TERMS
Computer security, Privacy, Identity management, Government policies, Petroleum industry, Economics, empirical, federated identity management, case study, security, identity management, single-sign-on, interviews, industry, FIM
CITATION
Jostein Jensen, Martin Gilje Jaatun, "Federated Identity Management—We Built It; Why Won't They Come?", IEEE Security & Privacy, vol.11, no. 2, pp. 34-41, March-April 2013, doi:10.1109/MSP.2012.135
REFERENCES
1. J. Jensen, "Benefits of Federated Identity Management—A Survey from an Integrated Operations Viewpoint," Availability, Reliability and Security for Business, Enterprise and Health Information Systems, LNCS 6908, Springer, 2011, pp. 1–12.
2. S. Landau and T. Moore, "Economic Tussles in Federated Identity Management," Proc. 10th Workshop Economics of Information Security (WEIS 11), 2011; http://weis2011.econinfosec.org/papersEconomic Tussles in Federated Identity Management.pdf.
3. D. Smith, "Federated ID: The Challenge of Federated Identity Management," Network Security, vol. 2008, no. 4, 2008, pp. 7–9.
4. J. Jensen, "Federated Identity Management Challenges," Proc. 7th Int'l Conf. Availability, Reliability, and Security, IEEE CS, 2012, pp. 230–235.
5. E.M. Rogers, Diffusion of Innovations, Free Press, 2003.
6. B. AlFayyadh et al., "Improving Usability of Password Management with Standardized Password Policies," Proc. 7th Conf. Network and Information Systems Security, 2012; https://sarssi2012.greyc.fr/wp-content/uploads SAR-SSI-2012_p38-45_AlFayyadh.pdf.
7. H. Hinton and M. Vandenwauver, "Identifying Patterns of Federation Adoption," ISSE 2006—Securing Electronic Business Processes, 2006, pp. 151–160.
8. R. Anderson, "Can We Fix the Security Economics of Federated Authentication?," Proc. 19th Int'l Workshop Security Protocols, Springer, 2011, pp. 33–48.
27 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool