Abstract. Several frameworks for identity management exist, each of them with its own distinguishing features. These frameworks are complex however, and their features not easily understood. This makes it hard for businesses to understand the intricacies, and difficult to select and deploy one. This paper develops business selection criteria and applies them to four popular identity management frameworks. The resulting score card (1) helps businesses to select and deploy an identity management system, and (2) provides valuable feedback to developers of identity management systems on the criteria that they should take into account when designing and implementing an identity management system that is useful for specific businesses.
Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical. Some use hash functions instead of the more hardware efficient symmetric encryption schemes as a cryptographic primitive. Others incur a rather large time penalty at the reader side, because the reader has to perform a key search over large tag key space. Moreover, they do not allow for dynamic, fine-grained access control to the tag that cater for more complex usage scenarios.In this paper we investigate such scenarios, and propose a model and corresponding privacy friendly protocols for efficient and fine-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side. Moreover, our protocol is able to recover from stolen readers.
eHealth is becoming an increasingly noteworthy domain in terms of public sector exploitation of information and communications technologies. Appro-priately identifYing the users of electronic health systems is a major contem-porary challenge. The appropriate identification of eHealth systems' and ser-vices' users is one of its core areas of concern. This paper develops a particular problem statement that relates to the notion of identifiers in eHealth, outlines its conceptual background, and defines a set of solutions to the problem outlined. It lists a variety of use cases or examples against which the issues can be tested (these are further explored in a parallel paper [13]), and proposes some possibilities for future work. In particular, the paper de-scribes the results of a 2007 workshop that explored all of these notions. While the paper bases its orientations in a general European framework, the main examples and illustrations used by the authors come from experiences in the Netherlands.Please use the followingformat when citing this chapter:
Abstract. We describe a basic service architecture that extends the currently dominant device-oriented approach of Personal Networks (PNs). It specifies functionality for runtime selection and execution of appropriate service components available in the PN, resulting in a highly dynamic, personalized, and context-aware provisioning of PN services to the user. The architectural model clearly connects the responsibilities of the various business roles with the individual properties (resources) of the PN Entities involved.
Through major innovations in software development Graphicomp succeeded in 1983 in creating ILP program (Intelligent Library Program) as a part of the ICAADS package (Integrated Computer Aided Architectural Design System) which enables maintenance of unlimited intelligent library items, in contrast to huge limited library figure files using large amounts of active diskspace unproductively. Further topics will be discussed: • Library Graphics aspects • Relations between library figures and architectural networks. • ACE menus. • Relations between various ACE applications. • Image design and solid modelling in ACE. • Relations towards 3D town planning and management. • Features of 3D‐landscaping with image design.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.