A Technology and Process Analysis for Contemporary Identity Management Frameworks

Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.

Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

The digital profile of a person has become one of the tradable digital commodities over the Internet. Identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues using biometric multimodal approaches. In this chapter, the authors review, assess, and consolidate the research and development activities of contemporary biometric and non-biometric identity management in 21 privately and publicly funded organisations. Furthermore, they develop a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then study these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. The goal is to provide readers with a comprehensive picture of the state of the art of the existing identity management frameworks that utilise biometric and non-biometric technologies with the aim to highlight the contemporary issues and progress in this area of identity management.


2012 ◽  
Vol 25 (3) ◽  
pp. 1-29
Author(s):  
Alex Ng ◽  
Paul Watters ◽  
Shiping Chen

Recently, identity management has gained increasing attention from both enterprises and government organisations, in terms of security, privacy, and trust. A considerable number of theories and techniques have been developed to deal with identity management issues within and between organisations. In this paper, the authors reviewed, assessed, and consolidated the research and development activities of identity management in 14 privately and publicly funded organisations. Furthermore, the authors developed a taxonomy to characterise and classify these identity management frameworks into two categories: processes and technologies. The authors then studied these frameworks by systematically reviewing the whole lifecycle of an identity management framework, including actors, roles, security, privacy, trust, interoperability, and federation. This paper aims to provide the reader with the state of art of existing identity management frameworks and a good understanding of the research issues and progress in this area.


i-com ◽  
2017 ◽  
Vol 16 (2) ◽  
pp. 181-193 ◽  
Author(s):  
Christian Reuter ◽  
Katja Pätsch ◽  
Elena Runft

AbstractThe Internet and especially social media are not only used for supposedly good purposes. For example, the recruitment of new members and the dissemination of ideologies of terrorism also takes place in the media. However, the fight against terrorism also makes use of the same tools. The type of these countermeasures, as well as the methods, are covered in this work. In the first part, the state of the art is summarized. The second part presents an explorative empirical study of the fight against terrorism in social media, especially on Twitter. Different, preferably characteristic forms are structured within the scope with the example of Twitter. The aim of this work is to approach this highly relevant subject with the goal of peace, safety and safety from the perspective of information systems. Moreover, it should serve following researches in this field as basis and starting point.


1967 ◽  
Vol 71 (677) ◽  
pp. 342-343
Author(s):  
F. H. East

The Aviation Group of the Ministry of Technology (formerly the Ministry of Aviation) is responsible for spending a large part of the country's defence budget, both in research and development on the one hand and production or procurement on the other. In addition, it has responsibilities in many non-defence fields, mainly, but not exclusively, in aerospace.Few developments have been carried out entirely within the Ministry's own Establishments; almost all have required continuous co-operation between the Ministry and Industry. In the past the methods of management and collaboration and the relative responsibilities of the Ministry and Industry have varied with time, with the type of equipment to be developed, with the size of the development project and so on. But over the past ten years there has been a growing awareness of the need to put some system into the complex business of translating a requirement into a specification and a specification into a product within reasonable bounds of time and cost.


2018 ◽  
Vol 17 (2) ◽  
pp. 169
Author(s):  
Aceng Ruhendi Saifullah

Dalam dekade terakhir, kajian tentang  relasi bahasa, media, dan teknologi komunikasi telah menjadi kajian lintas disiplin yang menarik  perhatian para ahli dari berbagai disiplin ilmu. Lebih khusus, dalam kaitannya dengan kajian wacana  di Internet, penggunaan bahasa di Internet  dipandang sebagai pertanda lahirnya “new genre” sekaligus sebagai the state of the art dalam kajian wacana, yang dikenal sebagai kajian computer mediated discourse analysis (CMDA).  Dalam konteks perkembangan itu, kajian ini dimaksudkan untuk merumuskan model  analisis relasi bahasa dan Internet berbasis CMDA. Pertanyaannya, “sejauh mana paradigma CMDA  dapat dirumuskan sebagai model pengembangan analisis relasi bahasa dan Internet. Kajian ini menemukan, bahwa ragam bahasa di Internet tidak sepenuhnya menunjukkan ciri-ciri ragam tulis, akan tetapi cenderung menunjukkan ciri-ciri “ragam lisan yang dituliskan”. Di samping itu, ditemukan pula, bahwa konteks media dan konteks situasi komunikasi tampak berpengaruh secara signifikan dalam menentukan makna suatu tuturan di Internet.  Dengan demikian, paradigma CMDA dalam kajian wacana di Internet tampak relevan digunakan, terutama untuk mengindentifikasi ragam bahasa dan makna tuturan di Internet.Kata kunci: konteks media; konteks situasi komunikasi; Internet; computer mediated discourse analysis (CMDA)In the last decade, the study of language relations, media, and communications technology has become an interdisciplinary study that attracts the attention of experts from various disciplines. More specifically, in relation to the study of discourse on the Internet, the use of language on the Internet is seen as a sign of the birth of "new genre" as well as the state of the art in discourse studies, known as computer mediated discourse analysis (CMDA). In the context of this development, this study is intended to formulate models of analysis of language and Internet relationships based on CMDA. The question centers on the extent to which the CMDA paradigm can be formulated as a model for the development of language and Internet relation analysis. This study reveals that the variety of languages on the Internet does not fully show the characteristics of writing, but tends to show the characteristics of "written verbal". In addition, the analysis showed that the context of the media and the context of the communication situation seemed to have a significant effect on determining the meaning of a speech on the Internet. Thus, the CMDA paradigm in the study of discourse on the Internet seems relevant to use, especially to identify the variety of languages and meanings of speech on the Internet.Keywords: media context; context of communication situation; Internet; computer mediated discourse analysis (CMDA)


1999 ◽  
Author(s):  
Reza Shekarriz ◽  
Charles J. Call

Abstract A review of the literature and the state-of-the-art in research and development of miniature heat exchangers is presented in this paper. The authors provide a discussion of what makes the micro- and meso-scales important, highlight the design constraints and challenges that surface when miniaturizing a heat exchanger, and outline and discuss the outstanding practical and scientific issues in this area. Finally, the most recent advances in manufacturing processes and application of these miniature heat exchangers are covered in this article.


2015 ◽  
pp. 392-422
Author(s):  
Zhaohao Sun ◽  
John Yearwood

Web services are playing a pivotal role in business, management, governance, and society with the dramatic development of the Internet and the Web. However, many fundamental issues are still ignored to some extent. For example, what is the unified perspective to the state-of-the-art of Web services? What is the foundation of Demand-Driven Web Services (DDWS)? This chapter addresses these fundamental issues by examining the state-of-the-art of Web services and proposing a theoretical and technological foundation for demand-driven Web services with applications. This chapter also presents an extended Service-Oriented Architecture (SOA), eSMACS SOA, and examines main players in this architecture. This chapter then classifies DDWS as government DDWS, organizational DDWS, enterprise DDWS, customer DDWS, and citizen DDWS, and looks at the corresponding Web services. Finally, this chapter examines the theoretical, technical foundations for DDWS with applications. The proposed approaches will facilitate research and development of Web services, mobile services, cloud services, and social services.


Sign in / Sign up

Export Citation Format

Share Document