Issue No. 05 - Sept.-Oct. (2012 vol. 10)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MSP.2012.119
Željko Obrenović , Backbase
Bart den Haak , Backbase
The integration of user customization with authentication follows four patterns. The local-user pattern tightly couples user authentication and customization. The external-user pattern loosely couples customization and authentication so that the customization module relies on the external authentication provider to authenticate users and return their unique identifiers. The local- + external-user pattern tightly couples customization to a local user account, but that account can be connected to multiple external authentication providers. Finally, the masked-external-user pattern requires extra effort to protect sensitive information about users' identity.
Authentication, User centered design, Computer security, Open systems, Pattern recognition, computer security, user customization, authentication, privacy, local-user pattern, external-user pattern, local- + external-user pattern, masked-external-user pattern, OpenID, OAuth
B. den Haak and &. Obrenović, "Integrating User Customization and Authentication: The Identity Crisis," in IEEE Security & Privacy, vol. 10, no. , pp. 82-85, 2012.