User-Centric Identity, Trust and Privacy

2011 ◽  
pp. 293-322
Author(s):  
Jean-Marc Seigneur ◽  
Christian Damsgaard Jensen

This chapter introduces entification as a means of allowing the users of e-services to create and manage multiple pseudonyms in a decentralized way; thereby limiting the ability to link transactions and users, whilst mitigating attacks due to the ownership of multiple identities. The entification framework fills the gap between the identity and the computational trust/reputation layers. It is difficult to safely assess linked evidence about multiple virtual identities because there might be overcounting of overlapping trust pieces of evidence. The entification framework uses a new mechanism, called trust transfer, to mitigate this issue, and allows the users to trade privacy for trust. Such a framework is essential in a world where more and more e-services want to rely on user-centric identity management.

Author(s):  
Bin Hu ◽  
Xiaofang Zhao ◽  
Cheng Zhang ◽  
Yan Jin ◽  
Bo Wei

Author(s):  
Alexandre B. Augusto ◽  
Manuel E. Correia

The massive growth of the Internet and its services is currently being sustained by the mercantilization of users’ identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even personal health records in order to provide a service. In essence, the services are presented as free and constitute a means by which the user is mercantilized, often without realizing the real value of its data to the market. In this chapter the auhors describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a digital identity architecture designed from the ground up to be user centric. OFELIA is an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users’ identity attributes to offer a highly versatile set of identity services but relies instead on having those attributes distributed among and protected by several otherwise unrelated Attribute Authorities. Only the end user, with his smartphone, knows how to aggregate these scattered Attribute Authorities’ identity attributes back into some useful identifiable and authenticated entity identity that can then be used by Internet services in a secure and interoperable way.


Author(s):  
Bart Priem ◽  
Eleni Kosta ◽  
Aleksandra Kuczerawy ◽  
Jos Dumortier ◽  
Ronald Leenes

Sign in / Sign up

Export Citation Format

Share Document