Supporting Trust and Privacy with an Identity-Enabled Architecture
نویسندگان
چکیده
منابع مشابه
Supporting Trust and Privacy with an Identity-Enabled Architecture
Cost reduction and a vastly increased potential to create new services, such as via the proliferation of the Cloud, have led to many more players and “end points”. With many of them being new entrants, possibly short-lived, the question of how to handle trust and privacy in this new context arises. In this paper, we specifically look at the underlying infrastructure that connects end-points ser...
متن کاملTowards a Trust Management Enabled Identity Metasystem
Existing identity metasystems provide enabling tools to manage, select, and control of digital identities but they have not provided the support of trust management that should cover how trust requirements associated with digital identities are modeled, how runtime conditions for trust are evaluated, and how the results of trust evaluation are consumed by systems/applications. In this paper, th...
متن کاملTrust and Privacy Enabled Service Composition Using Social Experience
In this paper, we present a framework for automatic selection and composition of services which exploits trustworthiness of services as a metric for measuring the quality of service composition. Trustworthiness is defined in terms of service reputation extracted from user profiles. The profiles are, in particular, extracted and inferred from a social network which accumulates users past experie...
متن کاملSecurity-enabled NFC Tag with Flexible Architecture Supporting Asymmetric Cryptography
©2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. DOI: http://dx...
متن کاملAn Architecture for Privacy-Aware Inter-domain Identity Management
The management of service oriented architectures demands an efficient control of service users and their authorizations. Similar to structured cabling in LANs, Identity & Access Management systems have proven to be important components of organizations’ IT infrastructures. Yet, due to new management challenges such as virtual organizations, on-demand computing and the integration of third party...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Future Internet
سال: 2012
ISSN: 1999-5903
DOI: 10.3390/fi4041016