Research in Techniques of Personal Identity Management
- Resource Type
- Conference
- Authors
- Liu, Wu; Ren, Ping; Sun, Donghong; Wang, Zailiang
- Source
- 2012 International Conference on Control Engineering and Communication Technology Control Engineering and Communication Technology (ICCECT), 2012 International Conference on. :912-915 Dec, 2012
- Subject
- Robotics and Control Systems
Signal Processing and Analysis
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Government
Internet
Authentication
Ontologies
Educational institutions
Security
Identity Management
Commerce Fraud
- Language
This paper proposed a model of 7-Phase Personal Identity Management Cycle which can capture important actors and events that happen around the management issues of a personal identity. This paper explained the purpose of each phase, the actors and the conditions involved in transition between phases. Examples and scenarios are also provided to give illustrations how this model can be used to address different issues in Identity Fraud.