scholarly journals Risk Analysis of Identity Management Approaches Employing Privacy Protection Goals

Author(s):  
Marit Hansen
2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


2012 ◽  
pp. 1112-1125
Author(s):  
Liam Peyton ◽  
Jun Hu

E-health networks can enable integrated healthcare services and data interoperability in the form of electronic health records accessible via Internet technology. Efficiency and quality of care can be improved for example by: streamlining administrative processes involving prescriptions and insurance payments; providing remote access to specialists through telemedicine; or correlating data from clinics, pharmacies and emergency rooms to detect potential adverse events. However, a major requirement to enable adoption of e-health networks is the ability to address issues around security, privacy and trust in a systematic manner. In particular, privacy legislation, regulatory guidelines, and organizational policies require that a framework for privacy protection must be established. Federated identity management can be used to systematically protect patient and health care provider identities in a single sign on framework that controls access to patient data, but an audit trail and reporting mechanism is needed in order to ensure and validate compliance. In this chapter, the authors use example e-health scenarios to analyze the legal, business and technical issues that need to be addressed.


2013 ◽  
Vol 846-847 ◽  
pp. 1405-1409
Author(s):  
Dao Li Huang ◽  
Yun Ting Lei ◽  
Zhi Le He

Based on the analysis of electronic identity management system to be constructed for challenge, this paper analyzes the development bottlenecks of network real-name system in China, then proposes a electronic identity management model for China's conditions, and discusses the issues about the operating mechanism, information security, personal privacy protection and legal basis that model may cause, finally provides corresponding legal suggestions.


2020 ◽  
Vol 7 (1) ◽  
pp. 21-40
Author(s):  
Hasnae L'Amrani ◽  
Younès El Bouzekri El Idrissi ◽  
Rachida Ajhoun

Digital identity management with the metamorphosis of web services enforces new security challenges. A set of identity management systems exists to deal with these identities, alongside the goal of improving user experience and gain secure access. Nowadays, one faces a large number of heterogeneous identity management approaches. This study treated several identity management systems. The federated system makes proof of it eligibility for the identity management. Thus, the researcher interest is on the federated model. Since it consists of the distribution of digital identity between different security domains. The base of security domains is a trust agreement between the entities in communication. Federated identity management faces the problem of interoperability between heterogeneous federated systems. This study is an approach of a technical interoperability between the federations. The authors propose an approach that will permit inter-operation and exchange identity information among heterogeneous federations.


Author(s):  
Rehab Alnemr ◽  
Matthias Quasthoff ◽  
Christoph Meinel

Business often develop proprietary reputation systems for their community, with the side effect of locking users into that service if they wish to maintain their reputation (Bonawitz, Chandrasekhar, & Viana, 2004). Reputation is used in multi-agent models like e-commerce, and distributed computation and reasoning. Currently, virtual communities are using their own reputation values only without exchanging knowledge. Reputation transfer or portability is a controversial subject that is considered either not applicable or of high potentials. Trust is used to carry out decisions in case of uncertainty. In that sense it is used in peer-to-peer (P2P) networks to facilitate its interactions. In P2P networks, peers’ willingness to share the content they have and forward the queries plays an important role during the content search process. Using reputation in P2P systems can be an incentive for peers to cooperate. The goal is to have dynamic social networks that work on acquiring, processing, establishing, analyzing, exchanging and evolving of knowledge. In this chapter, the authors are focusing on the use of one of the trust management approaches, namely the reputation-based approach. The connections of trust management to the classic IT security disciplines authorization, trust, and identity management will be laid out. With this background, a generic architecture for context-aware reputation systems, which can interact with identity-related services like identity providers and policy decision or enforcement points, is presented. More specialized architectures for different environments—business- or consumer-oriented—will be derived from the generic architecture.


Sign in / Sign up

Export Citation Format

Share Document