Identity Management for Wireless Service Access

Author(s):  
Mohammad M.R. Chowdhury ◽  
Josef Noll

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.

Author(s):  
Magnus Andersson ◽  
Rikard Lindgren

Ubiquitous access and pervasive computing concept is almost intrinsically tied to wireless communications. Emerging next-generation wireless networks enable innovative service access in every situation. Apart from many remote services, proximity services will also be widely available. People currently rely on numerous forms of identities to access these services. The inconvenience of possessing and using these identities creates significant security vulnerability, especially from network and device point of view in wireless service access. After explaining the current identity solutions scenarios, the chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds. The chapter also conveys various possibilities, challenges, and research questions evolving in these areas.


Author(s):  
Mohammad M.R. Chowdhury ◽  
Josef Noll

In a digital home a so-called multi-play system integrates networked entertainment and communications systems. Using a mobile phone, all those services can be controlled and used ubiquitously—from everywhere, at any time. Not much research has been conducted in the field of integrated communication offers. The novelty of this study is in that it addresses the ubiquitous communication system, called the multi-play service, from the perspectives of both the customer preference and operator strategy and transforms this into valuation of resources and capabilities. This chapter provides a framework to connect the customer value preferences to firm resources. The aim of the framework is to connect customer and resource-based strategies together. As a result of the analysis the authors reveal the most important resources in contrast to the customer value preferences.


Author(s):  
Abdullahi Arabo ◽  
Qi Shi ◽  
Madjid Merabti

Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and people rely on numerous identities to access these services. The inconvenience of these identities creates significant security vulnerability as well as user discomfort, especially from the network and device point of view in MANet environments. In this article, the authors address how contextual information is represented to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.


Author(s):  
Abdullahi Arabo ◽  
Qi Shi ◽  
Madjid Merabti

Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and people rely on numerous identities to access these services. The inconvenience of these identities creates significant security vulnerability as well as user discomfort, especially from the network and device point of view in MANet environments. The need of displaying only relevant contextual information (CI) with explicit user control arises in energy constraint devices and in dynamic situations. We propose an approach that allows users to define policies dynamically and a ContextRank Algorithm which will detect the usability of CI. The proposed approach is not only efficient in computation but also gives users total control and makes policy specification more expressive. In this Chapter, the authors address the issue of dynamic policy specification, usage of contextual information to facilitate IM and present a User-centered and Context-aware Identity Management (UCIM) framework for MANets.


2005 ◽  
Vol 13 (3) ◽  
pp. 533-563 ◽  
Author(s):  
Fred Phillips

This paper explores the evolution of the techno-management imagination (TMI). This is the process by which, in times of crisis, managers think not just out of the box, but out of the very reality in which the box resides. Tacit social consensus, also known as corporate culture, can lead to a shared, implicit, and incorrect view that certain actions are impossible. TMI transcends local culture, accessing technological solutions that are unknown and/or unimagined. Members of the organization tend to call such solutions “magic”. The paper looks at social, perceptual, and managerial aspects of magic from a practical point of view that is grounded in research. It examines the risks of TMI, and concludes with suggested perspectives and research questions for management scientists and cognitive scientists.


Author(s):  
Epaminondas Kapetanios

In this article, the author explores the notion of Collective Intelligence (CI) as an emerging computing paradigm. The article is meant to provide a historical and contextual view of CI through the lenses of as many related disciplines as possible (biology, sociology, natural and environmental sciences, physics) in conjunction with the computer science point of view. During this explorative journey, the article also aims at pinpointing the current strengths and weaknesses of CI-related computational and system engineering design and implementation methodologies of CI-based systems. A non-exhaustive list of case studies set up the stage for CI applications as well as challenging research questions. These can be particularly directed towards the Social Web, as a very prominent example of synergistic interactions of a group of people with diverse cultural and professional backgrounds and its potential to become a platform for the emergence of truly CI-based systems.


Author(s):  
Epaminondas Kapetanios

In this article, the author explores the notion of Collective Intelligence (CI) as an emerging computing paradigm. The article is meant to provide a historical and contextual view of CI through the lenses of as many related disciplines as possible (biology, sociology, natural and environmental sciences, physics) in conjunction with the computer science point of view. During this explorative journey, the article also aims at pinpointing the current strengths and weaknesses of CI-related computational and system engineering design and implementation methodologies of CI-based systems. A non-exhaustive list of case studies set up the stage for CI applications as well as challenging research questions. These can be particularly directed towards the Social Web, as a very prominent example of synergistic interactions of a group of people with diverse cultural and professional backgrounds and its potential to become a platform for the emergence of truly CI-based systems.


Author(s):  
Róbert Horváth ◽  
Gábor Kovács ◽  
Zoltán Pap

This chapter focuses on Next Generation Networks (NGN), how protocols employed in different segments of the telecommunication infrastructure interwork to guarantee the quality for different service types. After the interpretation of the definition and concept of NGN, the general architecture of NGN is presented with regard to the heterogeneous demands of services. The protocols used in different sections of the end-to-end communication relation are introduced from the point of view of service and transport functions of NGN. The main focus of the chapter is on the fixed access solutions and Ethernet based multi-service access and regional networks, but configuration and streaming protocols are covered as well.


2021 ◽  
pp. 570-585
Author(s):  
Elfriede Penz ◽  
Eva Hofmann

Intellectual property (IP) infringement is widely researched in behavioural studies with manifold quantitative and qualitative research. The current chapter focuses on qualitative research and gives an introduction to how data from expert interviews and websites of relevant stakeholders can be analysed to understand and interpret IP infringement applying triangulation. This chapter selects the comprehensive perspective of the entire business and institutional environment in an international context, focusing on the social-cultural, legal, economic, political, and technological framework in different countries, which determines business activities. It answers three research questions on past, current, and future activities regarding IP with data from forty-six organizations (expert interviews, website analyses). The analysis of the data with Computer Assisted/Aided Qualitative Data AnalysiS (CAQDAS) follows four steps: (1) organizing the material; (2) coding; (3) searching; and (4) modelling and interpreting. The analysis revealed that first, there were several activities regarding IP that have been applied by different stakeholders, second, the present status of IP from the point of view of the different stakeholders has a strong legal aspect, and third, a cross-national collaboration for enforcement and harmonizing legislation is seen important for the future of IP specifically by governmental bodies. Overall, these findings allow for recommendations not only for legislators but also for industry and organizations lobbying for more lenient IP rights leading to a bright future for IP.


Genealogy ◽  
2019 ◽  
Vol 3 (2) ◽  
pp. 17 ◽  
Author(s):  
Maria Letizia Bosoni ◽  
Sara Mazzucchelli

In the light of relevant and current debate on the changing role of fathers, this contribution is aimed at analysing the international literature on fatherhood, comparing two distinct periods of time, from the social, cultural and demographic point of view: the years 1980–1999 and the new millennium. This will contribute to identifying features of the fatherhood transformation in these two contexts, which in fact refer to two generations of fathers. The research questions to be answered are: Which aspects characterize the process of fatherhood transformation, in an intergenerational perspective? How are paternal childcare practices represented in different historical and social periods? An analysis of the academic publications on fathers in Scopus and Google Scholar will be conducted, in the two temporal periods indicated, using T-Lab software, in order to map fathers’ role representations.


Sign in / Sign up

Export Citation Format

Share Document