User Centricity

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 186 Experts worldwide ranked by ideXlab platform

Jun-liang Chen - One of the best experts on this subject based on the ideXlab platform.

  • A Delegation Solution for Universal Identity Management in SOA
    IEEE Transactions on Services Computing, 2011
    Co-Authors: Yang Zhang, Jun-liang Chen
    Abstract:

    The relationship-focused and credential-focused identity managements are both User-centric notions in Service-oriented architecture (SOA). For composite services, pure User-centric identity management is inefficient because each subservice may authenticate and authorize Users and Users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management where identity information and privileges are delegatable, User Centricity will be more feasible in SOA. The credential-focused system is a good starting point for constructing a universal identity management system. However, how to implement a practical delegation scheme is still a challenge although there are some delegatable anonymous credential schemes that were theoretically constructed. This paper aims to propose a practical delegation solution for universal identity management. For this, a pseudonym-based signature scheme is first designed where pseudonyms are self-generated and unlinkable for realizing User's privacy. Next, a proxy signature is presented with the pseudonyms as public keys where delegation can be achieved through certificate chains. Finally, the security of our scheme is analyzed and proved in the random oracle model.

  • Universal Identity Management Model Based on Anonymous Credentials
    2010 IEEE International Conference on Services Computing, 2010
    Co-Authors: Yang Zhang, Jun-liang Chen
    Abstract:

    The relationship-focused and credential-focused identity management are both User-centric notions in Service-oriented architecture (SOA). For composite services, pure User-centric identity management is inefficient because each sub-service may authenticate and authorize Users and Users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management model where identity information and privileges are delegatable, User-Centricity will be more feasible in SOA. This paper aims to extend WS-Federation to build a universal identity management model based on anonymous credentials, which provides the delegation of anonymous credentials and combines identity metasystem to support easy-to-use, consistent experience and transparent security. In addition, the concept of self-generated pseudonym is introduced to construct efficient anonymous delegation model.

Yang Zhang - One of the best experts on this subject based on the ideXlab platform.

  • A Delegation Solution for Universal Identity Management in SOA
    IEEE Transactions on Services Computing, 2011
    Co-Authors: Yang Zhang, Jun-liang Chen
    Abstract:

    The relationship-focused and credential-focused identity managements are both User-centric notions in Service-oriented architecture (SOA). For composite services, pure User-centric identity management is inefficient because each subservice may authenticate and authorize Users and Users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management where identity information and privileges are delegatable, User Centricity will be more feasible in SOA. The credential-focused system is a good starting point for constructing a universal identity management system. However, how to implement a practical delegation scheme is still a challenge although there are some delegatable anonymous credential schemes that were theoretically constructed. This paper aims to propose a practical delegation solution for universal identity management. For this, a pseudonym-based signature scheme is first designed where pseudonyms are self-generated and unlinkable for realizing User's privacy. Next, a proxy signature is presented with the pseudonyms as public keys where delegation can be achieved through certificate chains. Finally, the security of our scheme is analyzed and proved in the random oracle model.

  • Universal Identity Management Model Based on Anonymous Credentials
    2010 IEEE International Conference on Services Computing, 2010
    Co-Authors: Yang Zhang, Jun-liang Chen
    Abstract:

    The relationship-focused and credential-focused identity management are both User-centric notions in Service-oriented architecture (SOA). For composite services, pure User-centric identity management is inefficient because each sub-service may authenticate and authorize Users and Users need participate in every identity provisioning transaction. If the above two paradigms are unified into the universal identity management model where identity information and privileges are delegatable, User-Centricity will be more feasible in SOA. This paper aims to extend WS-Federation to build a universal identity management model based on anonymous credentials, which provides the delegation of anonymous credentials and combines identity metasystem to support easy-to-use, consistent experience and transparent security. In addition, the concept of self-generated pseudonym is introduced to construct efficient anonymous delegation model.

Noel Crespi - One of the best experts on this subject based on the ideXlab platform.

  • A semantic enhanced service exposure model for a converged service environment
    IEEE Communications Magazine, 2017
    Co-Authors: Cuiting Huang, Gary Geunbae Lee, Noel Crespi
    Abstract:

    Service exposure, as a prerequisite for the reuse of existing services, plays a significant role in next-generation service delivery. However, some issues such as cross-domain interoperability and User-Centricity are still unresolved. Therefore, this article proposes a semantic enhanced converged service exposure model that enables services derived from different domains (i.e., telecom/web/device/User) to be integrated into a composite service regardless of their underlying heterogeneities. Meanwhile, the User-centric feature is enhanced by applying the semantic annotation to both the service description and the User request, as well as empowering a User to publish and share his/her created service in a User-friendly way. Moreover, a variety of interfaces, including APIs, widgets, and natural-language-based tools, are provided to satisfy the multilevel User requirements, enabling Users to profit from a highly personalized, meaningful communication and interaction experience.

André Zúquete - One of the best experts on this subject based on the ideXlab platform.

  • Improving mobile networks based on social mobility modeling
    2011 19th IEEE International Conference on Network Protocols, 2011
    Co-Authors: Andréa G. Ribeiro, Rute Sofia, André Zúquete
    Abstract:

    Wireless networks growing popularity coupled with a wide availability of wireless-enabled personal devices is today the basis for User-centric Internet architectures to evolve. Central to this new paradigm of User-Centricity is the fact that today the Internet end-User exhibits a highly nomadic behavior, where most of the portable devices are carried by humans. The thesis proposed relates to the recent trend of social mobility modeling as a way to improve mobile network operation. The work is focused on the analysis of social mobility models and how to propose new models having in mind an overall network optimization due to the possibility to predict adequately node movement on mobile networks.

Dragan Gasevic - One of the best experts on this subject based on the ideXlab platform.

  • Enabling User Control with Personal Identity Management
    IEEE International Conference on Services Computing (SCC 2007), 2007
    Co-Authors: Marek Hatala, Dragan Gasevic
    Abstract:

    Being proactive and vigilant is the best defense against identity theft and the invasion of privacy. This recurrent advice from the public broadcasting attests that security breaches can happen and no identity management system can provide full-proof security. The challenge is even greater in service-oriented architectures where each User has their identities scattered across many services and has no control over management of those identities. Recent research in the area of the User-centric identity management makes User control and consent the key concept for identity management, but there is no consensus on the level of User-Centricity. This paper proposes a service-oriented architecture framework called personal identity management that truly puts Users in control over the management of their identities. The advantages of this proposal can be demonstrated through a comparison analysis of relevant identity management systems against a set of criteria required for today's identity management.