Supporting Trust and Privacy with an Identity-Enabled Architecture
نویسندگان
چکیده
Cost reduction and a vastly increased potential to create new services, such as via the proliferation of the Cloud, have led to many more players and “end points”. With many of them being new entrants, possibly short-lived, the question of how to handle trust and privacy in this new context arises. In this paper, we specifically look at the underlying infrastructure that connects end-points served by these players, which is an essential part of the overall architecture to enable trust and privacy. We present an enhanced architecture that allows real people, objects and services to reliably interact via an infrastructure providing assured levels of trust.
منابع مشابه
A Model for Privacy-enhanced Federated Identity Management
Identity federations operating in a business or consumer context need to prevent the collection of user data across trust service providers for legal and business case reasons. Legal reasons are given by data protection legislation such as [1]. Other reasons include business owners becoming increasingly aware of confidentiality risks that go beyond traditional information security, e.g., the nu...
متن کاملThree Pillars of Trust: Privacy, Identity Management and Compliance
In this paper we present details of a critical requirement of many systems, namely, trust. Trust is one of the oldest issues that has taken a new incarnation with advent of the Internet. In the context of the Internet and the scientific and commercial applications it has enabled, definition of trust stands to be rewritten and reviewed. Our research indicates that privacy, identity management, a...
متن کاملTowards a Trust Management Enabled Identity Metasystem
Existing identity metasystems provide enabling tools to manage, select, and control of digital identities but they have not provided the support of trust management that should cover how trust requirements associated with digital identities are modeled, how runtime conditions for trust are evaluated, and how the results of trust evaluation are consumed by systems/applications. In this paper, th...
متن کاملA Methodology for Security Assurance Driven Development
In this work we introduce an assurance methodology that integrates assurance case creation with system development. It has been developed in order to provide trust and privacy assurance to the evolving European project PICOS (Privacy and Identity Management for Community Services), an international research project focused on mobile communities and community-supporting services, with special em...
متن کاملA study on the role of the landscape design with the approach of solving the limitations of use for women in the coastal areas in Iran as an Islamic country
The coastal landscape is relatively new and complex category that offers the potential of sharing the sciences of architecture, perspective, nature and the environment, tourism and hospitality, beyond their physical effects on one another, their widespread effects in enhancing identity and the quality of the architectural atmosphere cannot be ignored. Approaches to greeting with beaches in Isla...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Future Internet
دوره 4 شماره
صفحات -
تاریخ انتشار 2012