Supporting Trust and Privacy with an Identity-Enabled Architecture

被引:1
|
作者
Sarma, Amardeo [1 ]
Girao, Joao [1 ]
机构
[1] NEC Labs Europe, Kurfurstenanlage 36, D-69115 Heidelberg, Germany
关键词
identity; privacy; trust; virtual identity; virtual infrastructure session; identity aggregator; cloud;
D O I
10.3390/fi4041016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cost reduction and a vastly increased potential to create new services, such as via the proliferation of the Cloud, have led to many more players and "end points". With many of them being new entrants, possibly short-lived, the question of how to handle trust and privacy in this new context arises. In this paper, we specifically look at the underlying infrastructure that connects end-points served by these players, which is an essential part of the overall architecture to enable trust and privacy. We present an enhanced architecture that allows real people, objects and services to reliably interact via an infrastructure providing assured levels of trust.
引用
收藏
页码:1016 / 1025
页数:10
相关论文
共 50 条
  • [1] Privacy Enabled Software Architecture
    Stefanova, Emilia
    Dimov, Aleksandar
    [J]. BUSINESS MODELING AND SOFTWARE DESIGN (BMSD 2021), 2021, 422 : 190 - 206
  • [2] Introduction: Privacy, trust, and identity management
    Crane, Stephen
    Pearson, Siani
    Sommer, Dieter
    [J]. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2011, 6545 : 141 - 149
  • [3] Supporting Privacy, Trust, and Personalization in Online Learning
    Mohd Anwar
    [J]. International Journal of Artificial Intelligence in Education, 2021, 31 : 769 - 783
  • [4] Supporting Privacy, Trust, and Personalization in Online Learning
    Anwar, Mohd
    [J]. INTERNATIONAL JOURNAL OF ARTIFICIAL INTELLIGENCE IN EDUCATION, 2021, 31 (04) : 769 - 783
  • [5] Privacy, trust, and identity issues for ubiquitous computing
    Little, Linda
    [J]. SOCIAL SCIENCE COMPUTER REVIEW, 2008, 26 (01) : 3 - 5
  • [6] Identity theft, privacy, and the architecture of vulnerability
    Solove, DJ
    [J]. HASTINGS LAW JOURNAL, 2003, 54 (04) : 1227 - 1276
  • [7] A Privacy Aware Architecture for IoT Enabled Systems
    Psychoula, Ismini
    Chen, Liming
    Yao, Xuanxia
    Ning, Huansheng
    [J]. 2019 IEEE SMARTWORLD, UBIQUITOUS INTELLIGENCE & COMPUTING, ADVANCED & TRUSTED COMPUTING, SCALABLE COMPUTING & COMMUNICATIONS, CLOUD & BIG DATA COMPUTING, INTERNET OF PEOPLE AND SMART CITY INNOVATION (SMARTWORLD/SCALCOM/UIC/ATC/CBDCOM/IOP/SCI 2019), 2019, : 178 - 183
  • [8] Trust and Privacy Enabled Service Composition Using Social Experience
    Mokarizadeh, Shahab
    Dokoohaki, Nima
    Matskin, Mihhail
    Kuengas, Peep
    [J]. SOFTWARE SERVICES FOR E-WORLD, 2010, 341 : 226 - +
  • [9] The Online Construction of Personal Identity through Trust and Privacy
    Durante, Massimo
    [J]. INFORMATION, 2011, 2 (04) : 594 - 620
  • [10] A Security, Privacy and Trust Architecture for Wireless Sensor Networks
    Kyriazanos, Dimitris M.
    Prasad, Neeli R.
    Patrikakis, Charalampos Z.
    [J]. PROCEEDINGS ELMAR-2008, VOLS 1 AND 2, 2008, : 523 - +