Non-Intrusive Identity Management

نویسنده

  • Stefan Brands
چکیده

This paper presents a novel architecture for digital identity management. The proposed architecture is highly secure and scales seamlessly across organizational boundaries, while at the same time protecting the privacy interests of individuals and organizations. To achieve these properties, the architecture heavily relies on Digital Credentials, a cryptographic authentication technology specifically designed to allow data subjects and organizations to securely co-manage identity-related information. We also examine the use of the new architecture in the context of three emerging information-sharing applications: Electronic Health Record management, E-Government, and Digital Rights Management.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AnApproach for Shibboleth and Grid Integration

Grid environments involve complex scenarios where PKI-based authentication and authorization might have to be delegated across n-tier security domains. Shibboleth is an identity management system designed to exchange attributes across domains for the primary purpose of authorization and its architecture is highly dependent on PKI. Supported by a Registry Service, we propose a non-intrusive appr...

متن کامل

Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management

To allow user applications to securely make use of various lightpath resources distributed across multiple domains in a user-friendly and privacypreserving way requires identity management functionality. Identity and attribute information has to be provided by the user to allow for authorized access to these resources. An identity management framework can facilitate such information exchange. W...

متن کامل

Discreet verification of user identity in pervasive computing environments using a non-intrusive technique

This paper presents a new approach for verifying user identity in pervasive environments using a non-intrusive behaviour tracking technique that offers minimum interruption to the user’s activities. The technique, termed Non-intrusive Identity Assertion System (NIAS), uses knowledge of how the user uses the environment’s services to infer their identity. The technique monitors user behaviour th...

متن کامل

Non-intrusive Lightweight Agents for Information Management

An information management system should reduce the workload of the user. It should also learn about user's preferences and reduce the e ort in managing information. We propose a non-intrusive approach to building information management systems, based on software agents. Software agents are programs that carry out actions on behalf of the user autonomously. We describe the issues involved in des...

متن کامل

Motor Energy Management based on Non-Intrusive Monitoring Technology and Wireless Sensor Networks 57 Motor Energy Management based on Non-Intrusive Monitoring Technology and Wireless Sensor Networks

Induction motors are widely used in industry as essential driving machines. There are many motor driven systems in plants, such as pumping systems, compressed air systems, and fan systems, etc. These motor driven systems use over 70% of the total electric energy consumed by industry. Because of the oversized installation or under-loaded conditions, motors generally operate at low efficiency whi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004