Distributed Contact and Identity Management
نویسنده
چکیده
Contact management is a twofold problem involving a local and global level where the separation between them is rather fuzzy. Locally, users need to deal with contact management, which refers to a local need to store, organize, maintain up to date, and find information that will allow them contacting or reaching other people, organizations, etc. Globally, users deal with identity management that refers to peers having multiple identities (i.e., profiles) and the need of staying in control of them. In other words, they should be able to manage what information is shared and with whom. We believe many existing applications try to deal with this problem looking only at the data level and without analyzing the underlying complexity. Our approach focus on the complex social relations and interactions between users, identifying three main subproblem: (i) management of identity, (ii) search, and (iii) privacy. The solution we propose concentrates on the models that are needed to address these problems. In particular, we propose a Distributed Contact Management System (DCM System) that: • Models and represents the knowledge of peers about physical or abstract objects through the notion of entities that can be of different types (e.g., locations, people, events, facilities, organizations, etc.) and are described by a set of attributes. • By representing contacts as entities, allows peers to locally organize their contacts taking into consideration the semantics of the contact’s characteristics. • By describing peers as entities allows them to manage their different identities in the network, by sharing different views of themselves (showing possibly different information) with different people. The contributions of this thesis are, (i) the definition of a reference architecture that allows dealing with the diversity in relation with the partial view that peers have of the world, (ii) an approach to search entities based on identifiers, (iii) an approach to search entities based on descriptions, and (iv) the definition of the DCM system that instantiates the previously mentioned approaches and architecture to address concrete usage scenarios.
منابع مشابه
Investigating the Effects of Brand Identity on Customer Loyalty from Social Identity Perspective
A key challenge to brand managers is how to gain a better understanding of the relationship between brand and customer loyalty constructs. Researchers have recognized that brand identity plays a key role in brand management. The purpose of this paper is to investigate the effect of brand identity and brand identification on brand loyalty through perceived value, customer satisfaction, and trust...
متن کاملThe Effect of Brand Identity on Brand Performance and Employees, Job Satisfaction with the Intermediating Role of Organizational Confidence
The purpose of this study was to do an empirical study on the service sector to investigate the effect of brand identity on brand performance and employees’ job satisfaction with the intermediating role of organizational confidence, using Buil et al. (2015) model. In this model, the effect of brand identity on brand performance and employees’ job satisfaction is investigated both directly and i...
متن کاملDistributed Multitarget Tracking and Identity Management
The problem of tracking multiple targets and managing their identities in sensor networks is considered. Each sensor is assumed to have its own surveillance region and an ability to communicate with its neighboring sensors.We propose a scalable, distributed, multitarget-tracking and identity-management algorithm that can track an unknown number of targets and manage their identities efficiently...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملService Oriented Federated Identity System Framework
The rapid evolution of network and distributed computing, such as Service Oriented Architecture (SOA), is increasing the challenge of securely controlling access to enterprise IT resources. As gaining access to distributed resources becomes increasingly vital, the ability to make sure that the right people have secure access to the right information at the right time becomes a critical requirem...
متن کامل