Distributed Contact and Identity Management

نویسنده

  • Alethia Graciela Hume Llamosas
چکیده

Contact management is a twofold problem involving a local and global level where the separation between them is rather fuzzy. Locally, users need to deal with contact management, which refers to a local need to store, organize, maintain up to date, and find information that will allow them contacting or reaching other people, organizations, etc. Globally, users deal with identity management that refers to peers having multiple identities (i.e., profiles) and the need of staying in control of them. In other words, they should be able to manage what information is shared and with whom. We believe many existing applications try to deal with this problem looking only at the data level and without analyzing the underlying complexity. Our approach focus on the complex social relations and interactions between users, identifying three main subproblem: (i) management of identity, (ii) search, and (iii) privacy. The solution we propose concentrates on the models that are needed to address these problems. In particular, we propose a Distributed Contact Management System (DCM System) that: • Models and represents the knowledge of peers about physical or abstract objects through the notion of entities that can be of different types (e.g., locations, people, events, facilities, organizations, etc.) and are described by a set of attributes. • By representing contacts as entities, allows peers to locally organize their contacts taking into consideration the semantics of the contact’s characteristics. • By describing peers as entities allows them to manage their different identities in the network, by sharing different views of themselves (showing possibly different information) with different people. The contributions of this thesis are, (i) the definition of a reference architecture that allows dealing with the diversity in relation with the partial view that peers have of the world, (ii) an approach to search entities based on identifiers, (iii) an approach to search entities based on descriptions, and (iv) the definition of the DCM system that instantiates the previously mentioned approaches and architecture to address concrete usage scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Investigating the Effects of Brand Identity on Customer Loyalty from Social Identity Perspective

A key challenge to brand managers is how to gain a better understanding of the relationship between brand and customer loyalty constructs. Researchers have recognized that brand identity plays a key role in brand management. The purpose of this paper is to investigate the effect of brand identity and brand identification on brand loyalty through perceived value, customer satisfaction, and trust...

متن کامل

The Effect of Brand Identity on Brand Performance and Employees, Job Satisfaction with the Intermediating Role of Organizational Confidence

The purpose of this study was to do an empirical study on the service sector to investigate the effect of brand identity on brand performance and employees’ job satisfaction with the intermediating role of organizational confidence, using Buil et al. (2015) model. In this model, the effect of brand identity on brand performance and employees’ job satisfaction is investigated both directly and i...

متن کامل

Distributed Multitarget Tracking and Identity Management

The problem of tracking multiple targets and managing their identities in sensor networks is considered. Each sensor is assumed to have its own surveillance region and an ability to communicate with its neighboring sensors.We propose a scalable, distributed, multitarget-tracking and identity-management algorithm that can track an unknown number of targets and manage their identities efficiently...

متن کامل

Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...

متن کامل

Service Oriented Federated Identity System Framework

The rapid evolution of network and distributed computing, such as Service Oriented Architecture (SOA), is increasing the challenge of securely controlling access to enterprise IT resources. As gaining access to distributed resources becomes increasingly vital, the ability to make sure that the right people have secure access to the right information at the right time becomes a critical requirem...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014