Figure 1 - uploaded by Felix Kabwe
Content may be subject to copyright.
[6] Identity management elements

[6] Identity management elements

Source publication
Conference Paper
Full-text available
The growth in the use of services on the World Wide Web has resulted in the proliferation of online cyber mischief, misrepresentation, and cybercrime. Cyber fraudsters and criminals hide their online identities to steal services and other valuables or harm innocent online services' users. We will reflect on the major sources of identity attributes...

Citations

... [21] Utilize automated face recognition to authenticate identity. In [22] a multimodal digital identity management system was proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft, an artificial intelligence technology is used to implement a technique of information fusion to combine the user's credential attributes for optimum recognition. [23] Proposed a method for automatic correlation of identity records from various sources. ...
Article
Full-text available
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. The main task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM). This paper provides a review on intelligent authentication research applicable to IAM systems. These researches are evaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be found research implement an authentication that satisfies all these key factors.
... [21] Utilize automated face recognition to authenticate identity. In [22] a multimodal digital identity management system was proposed as a solution for managing digital identity information in an effort to reduce the cases of identity fraud and theft, an artificial intelligence technology is used to implement a technique of information fusion to combine the user's credential attributes for optimum recognition. [23] Proposed a method for automatic correlation of identity records from various sources. ...
Article
Identity and access management (IAM) system usually consist of predefined tasks as an information security system. Themain task is the authentication, since it is responsible for user identity proving for service providers that corporate with (IAM).This paper provides a review on intelligent authentication research applicable to IAM systems. These researches areevaluated according to the proposal of intelligent authentication key factors. Depending on this evaluation it could not be foundresearch implement an authentication that satisfies all these key factors.