Managing Multiple and Dependable Identities
نویسندگان
چکیده
Our daily activities increasingly rely on remote resources and services — specifically, on interactions between different, remotely located parties. Because these parties might (and sometimes should) know little about each other, digital identities — electronic representations of individuals’ or organizations’ sensitive information — help introduce them to each other and control the amount of information transferred.1 In its broadest sense, identity management encompasses definitions and lifecycle management for digital identities and profiles, as well as environments for exchanging and validating such information. Digital identity management — especially support for identity dependability and multiplicity — is crucial for building and maintaining trust relationships in today’s globally interconnected society.2,3 In this article, we’ll investigate the problems inherent in identity management, emphasizing the requirements for multiplicity and dependability. This article’s content is a result of our activities on the RAPID project (the Roadmap for Advanced Research in Privacy and Identity Management; www.ra-pid.org).
منابع مشابه
I'm No Longer a Child: A Closer Look at the Interaction Between Iranian EFL University Students' Identities and Their Academic Performance
Although university EFL students represent a wide array of social and cultural identities, their multiple and diverse identities are not usually considered in foreign language classrooms. This qualitative case study attempted to examine identity conflicts experienced by Iranian EFL learners at the university context. To this end, two Shiraz University students' identities were investigated. Sem...
متن کاملManaging the Multiple Identities of the Corporation
R ecently, companies have been experiencing a period where the corporate identity landscape has become more active and more crowded. For example: • Mergers, spin-offs, acquisitions, and alliances have led to many new or meaningfully changed companies, in turn calling for new identities by name and/or business focus. • The proliferation of dot.com and new technology companies created many new (a...
متن کاملEfficient and dynamic key management for multiple identities in identity-based systems
The traditional identity-based cryptography requires a user, who holds multiple identities, to hold multiple private keys, where each private key is associated with an identity. Managing multiple private/public keys is a heavy burden to a user due to key management and storage. The recent advancement of identity-based cryptography allow a single private key to map multiple public keys (identiti...
متن کاملA Fully Automated Distributed Multiple-Target Tracking and Identity Management Algorithm
In this paper, we consider the problem of tracking multiple targets and managing their identities in sensor networks. Each sensor is assumed to be able to track multiple targets, manage the identities of targets within its surveillance region, and communicate with its neighboring sensors. The problem is complicated by the fact that the number of targets within the surveillance region of a senso...
متن کاملOn the Use of Radio Resource Tests in Wireless ad hoc Networks
Sybil identities are a major threat to the dependable operation of wireless ad hoc networks. This paper defines a framework to assess the power and performance of radio resource tests (RRT), a technique that allows the detection of Sybil identities. Several RRTs are analyzed and compared using this framework, including two novel RRTs and an optimization of a RRT previously proposed in the liter...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IEEE Internet Computing
دوره 7 شماره
صفحات -
تاریخ انتشار 2003