Title: Open Source Identity Management Systems
Author: Radovan Semančík
Date: January 2012
Abstract: The list and evaluation of open source identity management systems.

Title: OpenIDM Architecture Presentation
Author: Radovan Semančík
Date: January 2011
Slides: 74
Abstract: The presentation of OpenIDM principles, architecture, current development state and some details regarding the structure, subsystems and data model. Excellent start to get an overview of OpenIDM.
Files: openidm-architecture-presentation.pdf

Title: Interface Definition
Author: Radovan Semančík
Date: January 2010
Pages: 15
Abstract: This document provides guidelines and recommendations for interface definitions. It describes how the interface definitions should be formed, what usually needs to be included, how to create good definition and what to avoid. It provides some examples in Java programming language for illustration.
Files: interface-definition.pdf

Title: Deficiencies of World Wide Web Architecture
Author: Radovan Semančík
Date: November 2009
Pages: 22
Abstract: The World Wide Web is becoming global communication medium. However it was originally designed as a hyper-media system for static content. The original architecture of World Wide Web exhibits problems when applied to the current dynamic environment. This paper presents a model for describing human-computer interactions, which is used to define a new goals for World Wide Web architecture. The model and the definition of goals is used to evaluate current architecture of World Wide Web. Discovered inconsistencies and deficiencies of the architecture are described in detail. Identified problems originate from the vague meaning of WWW resource, the limited ability to express opinion about resource and to use such opinions to evaluate trustworthiness of information provided by the resource. The solution outline is provided is rough details, describing the conceptual ideas of one possible solution for described problems.
Files: deficiencies-of-www-architecture.pdf

Title: Revised World Wide Web Architecture
Author: Radovan Semančík
Date: December 2008
Pages: 144
Bibliography entry: Semančík, R.: Revised World Wide Web Architecture, Dissertation, Slovak University of Technology, 2008.
Abstract: Internet and World Wide Web were developed in evolutionary fashion following changing requirements of the users and usage patterns. The recent requirements on the dynamics of World Wide Web, increased interactivity and effectiveness of cooperation introduce yet another paradigm shift that goes deep into the architecture of World Wide Web. A model that can be used to describe the interactions of physical and virtual worlds is provided for better understanding of the forces behind these changes. The target environment for the Internet and World Wide Web is discussed; motivated by a desire to better understand requirements of the users. The described model and the discussion of desired environment is used to evaluate the architecture of the Internet and World Wide Web. Inconsistencies of World Wide Web architecture are identified and described in detail. Architectural improvements are proposed to solve the problems, described in a form of a new architectural styles and constraints, especially the RRSS architectural style. The proposed architecture is divided into several layers of abstraction for easier understanding and maintainability. Proposed architecture is validated by showing that it can support scenarios that are difficult to implement in current World Wide Web environment.
Files: semancik-dissertation.pdf

Title: Choosing the Best Identity Management Technology for Your Business
Author: Radovan Semančík
Date: May 2006
Pages: 10
Bibliography entry: Semančík, R.: Choosing the Best Identity Management Technology for Your Business, Proceedings of InfoSecOn 2006 Conference, Cavtat, Croatia, 2006.
Abstract: This paper summarizes the motivation for deploying identity management technologies and their features. The three areas of identity management are described: enterprise identity management, user-centric digital identity and government identity management. The specific problems of these areas are discussed together with possible solutions. The identity problems that span all three areas are described at the end of the document. The document concludes by summarizing the current state of identity management technology.
Files: 2006-infosecon-contribution-final.pdf

Title: Introduction to the Persona Model
Author: Radovan Semančík
Date: September 2005
Version: 1.1
Pages: 7
Abstract: This essay provides introduction to the Persona Model, that may be used to describe different identity-based interactions in computer networks. Basic ideas used to form the model are provided in this introduction as well as some of it's possible uses.
Files: persona-model-intro-v1-1.pdf

Title: Enterprise Digital Identity Architecture Roadmap
Author: Radovan Semančík
Date: April 2005
Version: 1.2
Pages: 8
Bibliography entry: Semančík, R.: How to Deploy Digital Identity Technology, Proceedings of Network Forum 2005 Conference, Banská Bystrica, Slovakia, pp. 48-56, 2005.
Abstract: This document describes the available digital identity technologies and their role in the enterprise identity management. Front-end and back-end identity management integration approaches are shortly described and the recommendation for phasing of digital identity projects is given.
Files: enterprise-digital-identity-architecture-roadmap-v1-2.pdf

Title: Internet Single Sign-On Systems
Author: Radovan Semančík
Date: April 2005
Pages: 8
Bibliography entry: Semančík, R.: Internet Single Sign-On Systems, In: Bieliková, M. (Ed.): Proceedings of IIT.SRC 2005: Student Research Conference in Informatics and Information Technologies, Bratislava, Slovakia, pp. 116-123, 2005.
Remark: Shortened version for IIT.SRC conference purposes. Publishing of full version under preparation.
Abstract: This document describes the requirements and general principles of Internet Single Sign-On systems. The general model of Internet SSO system is described. The Liberty ID-FF, WS-Federation, Shibboleth, SXIP and LID specifications are considered and of these specifications suitability for implementing an Internet SSO system is evaluated.
Files: internet-web-sso-iit-src-2005.pdf