By Ghazi Ben Ayed

How may privateness play a key position in preserving electronic identities? How may well we merge privateness legislations, regulations, rules and applied sciences to guard our electronic identities within the context of attached units and allotted platforms? during this publication, the writer addresses significant problems with identification safety and proposes a service-oriented layered framework to accomplish interoperability of privateness and safe disbursed platforms. The framework is meant to distill privacy-related electronic identification necessities (business interoperability) right into a set of companies, which in flip might be carried out at the foundation of open criteria (technical interoperability). The adoption of the proposed framework in protection tasks and projects may reduce complexities and foster knowing and collaborations among company and technical stakeholders. This paintings is a step towards imposing the author's imaginative and prescient of supplying cyber protection as a collection of independent multi-platform hosted companies that are meant to be on hand upon consumer request and on a pay-per-use foundation.

Show description

Read or Download Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework PDF

Similar computers books

Wireless Home Networking for Dummies (3rd Edition)

Instant domestic networks are larger than ever! The emergence of recent criteria has made them more uncomplicated, less difficult, less costly to possess and function. nonetheless, you must comprehend what to seem for (and glance out for), and the professional advice you'll locate in instant domestic Networks For Dummies, third version is helping you make sure that your wire-free existence can also be a elementary existence!

Category Theory and Computer Science: Paris, France, September 3–6, 1991 Proceedings

The papers during this quantity have been provided on the fourth biennial summer season convention on classification idea and laptop technological know-how, held in Paris, September3-6, 1991. class thought is still a tremendous software in foundationalstudies in computing device technology. it's been largely utilized through logicians to get concise interpretations of many logical techniques.

Computer Music: Synthesis, Composition, and Performance, 2nd Ed.

This article displays the present country of desktop expertise and song composition. The authors provide transparent, sensible overviews of software languages, real-time synthesizers, electronic filtering, man made intelligence, and lots more and plenty extra.

Additional resources for Architecting User-Centric Privacy-as-a-Set-of-Services: Digital Identity-Related Privacy Framework

Sample text

He adds that digital identity will ensure that internet infrastructure respond to multiple needs including security, privacy, and reliability. The world of digital identity has its own nomenclature. The following terms are derived from [27, 28], Windley’s book [29], SAML-OASIS glossary [37], Liberty Alliance Technical glossary [26, 38, 39]. An ‘entity’ represents an active element of a computer/network system. It could be a single person; a group of persons, an automated process, a set of processes, a software program, a subsystem, an entire organization, a machine, a host system, a networking device or in general other thing making a request to access a resource.

He declares “the human experience of identity has two elements: a sense of belonging and a sense of being separate” [21]. From computer science and information technology perspectives, digital identity, online identity and others concepts have emerged. We cover these aspects further on this dissertation. From history, anthropology, and archeology perspectives, identity refer to human origins and identity construction over time. From genetics perspective, major issues are addressed such as genetics and origins of species, and how molecular genetics influence human personalities.

While, [27] defines the identity establishment concept as ‘the representation of methods by which, a user, a running process, or a thread of execution is securely associated with a legitimate entity’. The author states that the goal of ‘identification and authentication (I&A)’, which is the process of establishing a user identity, is to provide to the entity access only to authorized computer resources. However, [28] restrict the entity definition to people or organization and define the identity, within a specific application domain, as an entity representation through a generation of a unique key, which combines all the elements of identity 16 2 Digital Identity information; and (2) in the Webster’s New Explorer Dictionary, the word ‘digital’ means ‘done with the finger or toe’ and narrowly, a ‘digital computer’ is a mean by which ‘provides a readout in numerical digits’.

Download PDF sample

Architecting User-Centric Privacy-as-a-Set-of-Services: by Ghazi Ben Ayed
Rated 4.88 of 5 – based on 33 votes