IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management

A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management
View Sample PDF
Author(s): Alexandre B. Augusto (University of Porto, Portugal)and Manuel E. Correia (University of Porto, Portugal)
Copyright: 2016
Pages: 23
Source title: Psychology and Mental Health: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Information Resources Management Association (USA)
DOI: 10.4018/978-1-5225-0159-6.ch019

Purchase

View A Mobile-Based Attribute Aggregation Architecture for User-Centric Identity Management on the publisher's website for pricing and purchasing information.

Abstract

The massive growth of the Internet and its services is currently being sustained by the mercantilization of users' identities and private data. Traditional services on the Web require the user to disclose many unnecessary sensitive identity attributes like bankcards, geographic position, or even personal health records in order to provide a service. In essence, the services are presented as free and constitute a means by which the user is mercantilized, often without realizing the real value of its data to the market. In this chapter the auhors describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a digital identity architecture designed from the ground up to be user centric. OFELIA is an identity/authorization versatile infrastructure that does not depend upon the massive aggregation of users' identity attributes to offer a highly versatile set of identity services but relies instead on having those attributes distributed among and protected by several otherwise unrelated Attribute Authorities. Only the end user, with his smartphone, knows how to aggregate these scattered Attribute Authorities' identity attributes back into some useful identifiable and authenticated entity identity that can then be used by Internet services in a secure and interoperable way.

Related Content

Peter Arthur Barone. © 2023. 17 pages.
Patricia A. Goforth. © 2023. 22 pages.
Steven Lloyd Leeper. © 2023. 18 pages.
Neslihan Yayla. © 2023. 25 pages.
İlknur Gümüş. © 2023. 14 pages.
Sarah E. Daly. © 2023. 15 pages.
Yakup Alper Varış. © 2023. 22 pages.
Body Bottom