RT Journal Article
JF IEEE Security & Privacy
YR 2012
VO 10
IS
SP 82
TI Integrating User Customization and Authentication: The Identity Crisis
A1 Bart den Haak,
A1 Željko Obrenović,
K1 Authentication
K1 User centered design
K1 Computer security
K1 Open systems
K1 Pattern recognition
K1 computer security
K1 user customization
K1 authentication
K1 privacy
K1 local-user pattern
K1 external-user pattern
K1 local- + external-user pattern
K1 masked-external-user pattern
K1 OpenID
K1 OAuth
AB The integration of user customization with authentication follows four patterns. The local-user pattern tightly couples user authentication and customization. The external-user pattern loosely couples customization and authentication so that the customization module relies on the external authentication provider to authenticate users and return their unique identifiers. The local- + external-user pattern tightly couples customization to a local user account, but that account can be connected to multiple external authentication providers. Finally, the masked-external-user pattern requires extra effort to protect sensitive information about users' identity.
PB IEEE Computer Society, [URL:http://www.computer.org]
SN 1540-7993
LA English
DO 10.1109/MSP.2012.119
LK http://doi.ieeecomputersociety.org/10.1109/MSP.2012.119