Privacy and Identity Management for Life 2011
DOI: 10.1007/978-3-642-20317-6_23
|View full text |Cite
|
Sign up to set email alerts
|

Privacy by Sustainable Identity Management Enablers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2017
2017

Publication Types

Select...
1
1
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…In addition, we have demonstrated that the use of the identifier select in combination with the local OP creates a higher level of privacy. This concept can be seen as an IdM Enabler as described in [9], allowing OpenID to be used by MNOs to offer new application services, which need elevated security and rely on trusted identity information. We have implemented the local OP and the OPSF and successfully demonstrated login to different RP websites without any modification to their OpenID implementation.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…In addition, we have demonstrated that the use of the identifier select in combination with the local OP creates a higher level of privacy. This concept can be seen as an IdM Enabler as described in [9], allowing OpenID to be used by MNOs to offer new application services, which need elevated security and rely on trusted identity information. We have implemented the local OP and the OPSF and successfully demonstrated login to different RP websites without any modification to their OpenID implementation.…”
Section: Discussionmentioning
confidence: 99%
“…Building on their customer relationships and an existing infrastructure for authentication and communication, MNOs are a prime candidate to monetize this data by providing IdM services to third-party service providers [8,9]. They are in possession of IdM data assets , i.e., they can provide user attributes such as address, name, etc.…”
Section: Role Of Mobile Network Operatorsmentioning
confidence: 99%
“…Other fundamental work on business models was done by Wirtz and Osterwalder and Pigneur [22,29,30]. Furthermore, the application of business model approaches to anonymization and identity management services is considered [17][18][19]28].…”
Section: Related Workmentioning
confidence: 99%
“…Identities are represented by different accounts that the user may have at different identity providers. Koschinat, Rannenberg, and Bal (2009) commented that the Liberty Alliance framework has a complex interaction scheme, which requires the introduction of multiple services at different entities which could lead to problems in the adoption by users. Furthermore, the use of standard SOAP and XML structures increases interoperability but requires other, additional entities are also compatible with Liberty Alliance framework.…”
Section: Interoperabilitymentioning
confidence: 99%