Context based enforcement of authorization for privacy and security in identity management

被引:0
|
作者
Alagar, Vasu [1 ]
Wan, Kaiyu [1 ]
机构
[1] Concordia Univ, Montreal, PQ, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Protecting the identity of an individual is a shared responsibility between the individual, the organizations with whom the individual will be transacting during her life time, and the state of which the individual is a legal resident. Identity theft occurs when someone uses an individual's personal information without the knowledge of the individual to commit a crime, such as fraud or theft. Of late identity theft has become one of the fastest growing crimes, not only in western countries but also in developing countries where internet dominates business, financial transactions of big organizations, and social activities of individuals. In this paper we discuss a context based enforcement of authorization to protect the privacy of individuals and secure information about them stored in large identity management systems.
引用
收藏
页码:25 / 37
页数:13
相关论文
共 50 条
  • [1] Context based enforcement of authorization for privacy and security in identity management
    Alagar, Vasu
    Wan, Kaiyu
    [J]. IFIP Advances in Information and Communication Technology, 2008, 261 : 25 - 37
  • [2] Privacy policy enforcement in enterprises with identity management solutions
    Mont, Marco
    Thyne, Robert
    [J]. JOURNAL OF COMPUTER SECURITY, 2008, 16 (02) : 133 - 163
  • [3] Privacy Enforcement by Identity Management in Smart Surveillance Systems
    Vagts, H.
    Krempel, E.
    Beyerer, J.
    [J]. 16TH INTERNATIONAL CONFERENCE ON DISTRIBUTED MULTIMEDIA SYSTEMS (DMS 2010), 2010, : 64 - 69
  • [4] Macroeconomics of privacy and security for identity management and surveillance
    Katos, Vasilios
    Stowell, Frank
    Bednar, Peter
    [J]. KYBERNETES, 2013, 42 (1-2) : 140 - 163
  • [5] IDENTITY MANAGEMENT ON BLOCKCHAIN - PRIVACY AND SECURITY ASPECTS
    Panait, Andreea-Elena
    Olimid, Ruxandra F.
    Stefanescu, Alin
    [J]. PROCEEDINGS OF THE ROMANIAN ACADEMY SERIES A-MATHEMATICS PHYSICS TECHNICAL SCIENCES INFORMATION SCIENCE, 2020, 21 (01): : 45 - 52
  • [6] Enhancing IoT Security and Privacy with Claims-based Identity Management
    Bhargavi, Mopuru
    Pachipala, Yellamma
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2023, 14 (11) : 822 - 830
  • [7] A privacy enabled service authorization based on a user-centric virtual identity management system
    Chen, Zhikui
    [J]. 2007 SECOND INTERNATIONAL CONFERENCE IN COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1 AND 2, 2007, : 583 - 587
  • [8] Authorization Constraint Enforcement for Information System Security
    Hewett, Rattikorn
    Kijsanayothin, Phongphun
    [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN AND CYBERNETICS (SMC), VOLS 1-6, 2008, : 3501 - 3506
  • [10] Security Concerns of Identity Authentication and Context Privacy Preservation in uHealthcare System
    Lee, Seonmin
    Kim, Hyunsung
    Lee, Sung-Woon
    [J]. 2013 14TH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD 2013), 2013, : 107 - 112