2008
DOI: 10.1007/s11277-008-9475-4
|View full text |Cite
|
Sign up to set email alerts
|

Virtual Identity Framework for Telecom Infrastructures

Abstract: Identity Management has so far been a field mainly applications and Web focused. This paper describes a novel approach to cross layer identity management that extends digital identities to the network, the virtual identity (VID) framework. The VID framework provides strong privacy to the user, while easily supporting personalization crossservice providers. While other identity management solutions are tailored to one specific application and/or protocol domain, the proposed framework extends the use of one's d… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2009
2009
2022
2022

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 29 publications
(15 citation statements)
references
References 6 publications
0
15
0
Order By: Relevance
“…VID is not accessible by attacker and it is an impossible task to access the information of user without VID. Hence, the VID framework ensures the privacy of user’s information and saves from attackers and unauthorized access [ 117 ].…”
Section: Security Mechanisms For Iotmentioning
confidence: 99%
“…VID is not accessible by attacker and it is an impossible task to access the information of user without VID. Hence, the VID framework ensures the privacy of user’s information and saves from attackers and unauthorized access [ 117 ].…”
Section: Security Mechanisms For Iotmentioning
confidence: 99%
“…Virtual network stacks appear as another proposal that uses cross‐layer pseudonymity but tied to user identity, following the virtual identity framework . It also addresses the granularity at which new pseudonyms should be required, instantiating VNS per identity, enabling also the control over personalization and pervasive services constricted to each virtual identity.…”
Section: Related Workmentioning
confidence: 99%
“…One of these results was the Virtual Identity concept [4] [5] and its application to such infrastructures, where the virtual identity denotes an entity in a specific role or usage context, not the entity in its entirety. However, they have not addressed the problem of how the wide range of entities can be organized in establishing a particular use or session.…”
Section: Related Workmentioning
confidence: 99%
“…The general scheme is illustrated in Figure 3, which makes the future Internet of things an Identinet. Here, each end point, whether a person, a service, some software or a sensor cloud will be represented by an identity, that is again designated in its digital from as data, such as by a virtual identity [4]. Some devices now considered end points become interim nodes in the communication, each of which is also represented by an identity.…”
Section: Identinetmentioning
confidence: 99%
See 1 more Smart Citation