The Review of Non-Technical Assumptions in Digital Identity Architectures

Anar Bazarhanova, Kari Smolander

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

Abstract

The literatureondigital identity management systems (IdM) is abundant andsolutionsvaryby technology components and non-technicalrequirements. In the long run, however, there is a need for exchanging iden-tities across domains or even borders,which requires interoperable solutions and flexible architectures. This article aims togivean overview of the current research on digital identitymanagement. We conducta system-atic literature review of digital identity solution archi-tectures and extract their inherent non-technical as-sumptions.The findings show thatsolutiondesigns can be based on organizational, business and trust assump-tions as well as human-user assumptions. Namely, es-tablishing the trust relationships and collaborations among participating organizations; human-users capa-bilityformaintaining private cryptographic materialor the assumptions that win-win business models could be easily identified.By reviewing the key findings of solu-tions proposed and looking at the differences and com-monalities of their technical, organizational and social requirements, we discuss their potential real-life inhib-itors and identify opportunities for future research in IdM.
Original languageEnglish
Title of host publicationHawaii International Conference on System Sciences 2020
Number of pages10
ISBN (Electronic)978-0-9981331-3-3
DOIs
Publication statusPublished - 2020
MoE publication typeA4 Article in a conference publication
EventAnnual Hawaii International Conference on System Sciences - Maui, United States
Duration: 7 Jan 202010 Jan 2020
Conference number: 53

Conference

ConferenceAnnual Hawaii International Conference on System Sciences
Abbreviated titleHICSS
CountryUnited States
CityMaui
Period07/01/202010/01/2020

Fingerprint Dive into the research topics of 'The Review of Non-Technical Assumptions in Digital Identity Architectures'. Together they form a unique fingerprint.

Cite this