Blended Identity: Pervasive IdM for Continuous Authentication

A proper identity management approach is necessary for pervasive computing to be invisible to users. Federated identity management is key to achieving efficient identity blending and natural integration in the physical and online layers where users, devices, and services are present.

[1]  Andrea Baker,et al.  Mick or Keith: blended identity of online rock fans , 2009 .

[2]  Chuan Qin,et al.  Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.

[3]  K. Cameron The Laws of Identity , 2005 .

[4]  Rachna Dhamija,et al.  The Seven Flaws of Identity Management: Usability and Security Challenges , 2008, IEEE Security & Privacy.

[5]  Frank Stajano Pico: No More Passwords! , 2011, Security Protocols Workshop.

[6]  W ManchalaDaniel E-Commerce Trust Metrics and Models , 2000 .

[7]  Andrés Marín López,et al.  fedTV: personal networks federation for IdM in mobile DTV , 2011, IEEE Transactions on Consumer Electronics.

[8]  Eve Maler,et al.  The Venn of Identity: Options and Issues in Federated Identity Management , 2008, IEEE Security & Privacy.

[9]  S. Erfani,et al.  Journal of network and systems management , 2005, Journal of Network and Systems Management.

[10]  Andrés Marín López,et al.  Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.

[11]  Francisco J. Ballesteros,et al.  SHAD: A Human-Centered Security Architecture for the Plan B Operating System , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07).

[12]  David A. Cooper,et al.  Guidelines for the selection, configuration, and use of Transport Layer Security (TLS) implementations , 2005 .

[13]  David W. Chadwick,et al.  Federated Identity Management , 2009, FOSAD.

[14]  Zhu Han,et al.  Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.

[15]  Andrés Marín López,et al.  A Metric-Based Approach to Assess Risk for “On Cloud” Federated Identity Management , 2012, Journal of Network and Systems Management.

[16]  W. Marsden I and J , 2012 .

[17]  Daniel W. Manchala E-Commerce Trust Metrics and Models , 2000, IEEE Internet Comput..

[18]  James H. Aylor,et al.  Computer for the 21st Century , 1999, Computer.

[19]  Ralph L. Keeney,et al.  Decisions with multiple objectives: preferences and value tradeoffs , 1976 .

[20]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.