Secure Identity Management for Pseudo-Anonymous Service Access

Author(s):  
Michael Hitchens ◽  
Judy Kay ◽  
Bob Kummerfeld ◽  
Ajay Brar
Author(s):  
Magnus Andersson ◽  
Rikard Lindgren

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.


Author(s):  
Mohammad M.R. Chowdhury ◽  
Josef Noll

In a digital home a so-called multi-play system integrates networked entertainment and communications systems. Using a mobile phone, all those services can be controlled and used ubiquitously—from everywhere, at any time. Not much research has been conducted in the field of integrated communication offers. The novelty of this study is in that it addresses the ubiquitous communication system, called the multi-play service, from the perspectives of both the customer preference and operator strategy and transforms this into valuation of resources and capabilities. This chapter provides a framework to connect the customer value preferences to firm resources. The aim of the framework is to connect customer and resource-based strategies together. As a result of the analysis the authors reveal the most important resources in contrast to the customer value preferences.


Author(s):  
Mohammad M.R. Chowdhury ◽  
Josef Noll

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.


Crisis ◽  
2012 ◽  
Vol 33 (2) ◽  
pp. 113-119 ◽  
Author(s):  
Michael S. Rodi ◽  
Lucas Godoy Garraza ◽  
Christine Walrath ◽  
Robert L. Stephens ◽  
D. Susanne Condron ◽  
...  

Background: In order to better understand the posttraining suicide prevention behavior of gatekeeper trainees, the present article examines the referral and service receipt patterns among gatekeeper-identified youths. Methods: Data for this study were drawn from 26 Garrett Lee Smith grantees funded between October 2005 and October 2009 who submitted data about the number, characteristics, and service access of identified youths. Results: The demographic characteristics of identified youths are not related to referral type or receipt. Furthermore, referral setting does not seem to be predictive of the type of referral. Demographic as well as other (nonrisk) characteristics of the youths are not key variables in determining identification or service receipt. Limitations: These data are not necessarily representative of all youths identified by gatekeepers represented in the dataset. The prevalence of risk among all members of the communities from which these data are drawn is unknown. Furthermore, these data likely disproportionately represent gatekeepers associated with systems that effectively track gatekeepers and youths. Conclusions: Gatekeepers appear to be identifying youth across settings, and those youths are being referred for services without regard for race and gender or the settings in which they are identified. Furthermore, youths that may be at highest risk may be more likely to receive those services.


2004 ◽  
Author(s):  
J. E. Farmer ◽  
W. E. Marien ◽  
M. J. Clark ◽  
A. Sherman ◽  
T. J. Selva
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document