Loading

A Review on Various Identity Management Systems
Gaurav Sharma1, Shefali Pruthi2

1Asstt. Prof. Gaurav Sharma, CSE, JMIT, Radaur, India.
2Scholar Shefali Pruthi, CSE, JMIT, Radaur, India.
3Ali Parvaresh, Department of electrical engineering, Shahid Rajaee Teacher Training University, Tehran, Iran.

Manuscript received on July 01, 2012. | Revised Manuscript received on July 05, 2012. | Manuscript published on July 10, 2012. | PP: 13-15 | Volume-1, Issue-2, July 2012. | Retrieval Number: B0145061212/2012©BEIESP
Open Access | Ethics and  Policies | Cite 
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In this era there is a significant growth in identity management solution because of their potential importance as what and how properly they handle the sensitive data. The paper present the review on digital identities which is to be handled by various Identity Management System (IDMs). The paper first provide the definition of Digital Identities and their management. Then these digital identities are embedded in a particular model which is called conceptual model of identity management. Then there is a brief review on various Identity Management system and their advantages and disadvantages as proposed by different authors but our focus is on emerging technology i.e. Microsoft Cardspace and the solution for improving its security vulnerabilities.
Keywords: Digital Identities, Identity Management System, Microsoft Cardspace, Sensitive Data.