Context-Aware Identity Management in Pervasive Ad-hoc Environments

@article{Arabo2009ContextAwareIM,
  title={Context-Aware Identity Management in Pervasive Ad-hoc Environments},
  author={Abdullahi Arabo and Qi Shi and Madjid Merabti},
  journal={Int. J. Adv. Pervasive Ubiquitous Comput.},
  year={2009},
  volume={1},
  pages={29-42}
}
Contextual information and Identity Management (IM) is of paramount importance in the growing use of portable mobile devices for sharing information and communication between emergency services in pervasive ad-hoc environments. Mobile Ad-hoc Networks (MANets) play a vital role within such a context. The concept of ubiquitous/pervasive computing is intrinsically tied to wireless communications. Apart from many remote services, proximity services (context-awareness) are also widely available, and… 
Identity Management for Wireless Service Access
TLDR
The chapter illustrates the on-going efforts by various organizations, the requirements and frameworks to develop an innovative, easy-to-use identity management mechanism to access the future diverse service worlds.
A Survey on Identity Management for the Future Network
TLDR
This survey presents the state of the art of Identity Management systems for the Future Network, highlighting the existing architectures, specific devices applied, challenges and future perspectives.
Identity Management in the Internet of Things: the Role of MANETs for Healthcare Applications
TLDR
This paper examines the underlying issues behind IDM and proposes a framework which aims to achieve the identification of Things and their safe management and aims to open a research debate which will help to solve the future IoT IDM issues in healthcare applications.
Secure, efficient and privacy-aware framework for unstructured peer-to-peer networks
TLDR
Simulation results show that the proposed framework ensures better scalability and membership management in unstructured P2P networks, and improves the performance of the search and broadcasting in terms of the average shortest path and control overhead while maintaining user anonymity and system resiliency.
Security framework for smart devices
  • A. Arabo, F. El-moussa
  • Computer Science
    Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec)
  • 2012
TLDR
A new security framework for home devices that is easier to use is provided, so as to minimise and reduce the security threats identified.
Inscribing Interpretive Flexibility of Context Data in Ubiquitous Computing Environments: An Action Research Study of Vertical Standard Development
TLDR
An attempt to shift the locus of interpretation of context data by rearranging an assemblage of embedded, mobile, and stationary technologies is reported, with an analysis of existing design requirements for context-aware ecosystems.
Deploying Ubiquitous Computing Applications on Heterogeneous Next Generation Networks
TLDR
This chapter describes a human centric approach for designing and deploying ubiquitous computing applications, considered as activity spheres consisting of tasks which must be executed using the resources available in an Ambient Intelligence space, which enable the management of activity spheres.
2 Plastic Interfaces for Ubiquitous Learning
TLDR
This chapter presents research around pervasive and ubiquitous computing, particularly oriented in the field of human learning, and presents an adaptive pervasive learning environment, called PerZoovasive, where learning activities take place in a zoo and are meant to enhance classroom activities.
Intelligent Agent Framework for Secure Patient-Doctor Profiling and Profile Matching
TLDR
Wireless radio frequency identification technology is employed to acquire patient data and wireless technology for fast data acquisition and transmission is integrated, while maintaining the security and privacy issues.
Consumer Attitudes toward RFID Usage
TLDR
The applications of RFID in use today can be sorted into two groups of products: transponders or tags that are attached to animate or inanimate objects and are automatically read by a network infrastructure or networked reading devices.
...
...

References

SHOWING 1-10 OF 38 REFERENCES
A Framework for User-Centred and Context-Aware Identity Management in Mobile Ad Hoc Networks (UCIM)
TLDR
This paper proposes a framework for MANets that makes the flow of partial identities explicit, gives users control over such identities based on the respective situation and context, and creates a balance between convenience and privacy.
Towards a Context-Aware Identity Management in Mobile Ad Hoc Networks (IMMANets)
  • A. Arabo, Q. Shi, M. Merabti
  • Computer Science
    2009 International Conference on Advanced Information Networking and Applications Workshops
  • 2009
TLDR
The main focus is on the area of identity management (IM), context-awareness and user-centricity for MANets together with its security issues and implications.
UNIQuE: A User-Centric Framework for Network Identity Management
TLDR
This paper proposes a framework for network identity management on the Internet that addresses these issues from a user-centric point of view, and describes the architecture of this framework called UNIQuE in detail.
A framework of mobile context management for supporting context-aware environments in mobile ad hoc networks
TLDR
A virtual overlay network and two novel approaches in this framework are addressed to significantly improve the efficiency of data delivery in MANETs to outperform the existing publish/subscribe approach based on AODV routing protocol.
Enabling User Control with Personal Identity Management
TLDR
This paper proposes a service-oriented architecture framework called personal identity management that truly puts users in control over the management of their identities.
User-Centric Identity Management: New Trends in Standardization and Regulation
TLDR
The European Commission-funded Privacy and Identity Management tor Europe project (Prime: www.prime-projeet.eu) proposes a solution driven by the EU Privacy Directive, which puts the user in control wherever possible, and how it interacts with standardization initiatives and international organizations is focused on.
An Information Model and Architecture for Context-Aware Management Domains
TLDR
This paper addresses the problem of integration problem using a new context-aware policy management abstraction called Context-aware management domains (CAMDs), which allow the grouping of entities, for which a common set of policies apply, based on the entities' context.
Ubiquitous Communication: where is the Value Created in the Multi-Play Value Network?
In a digital home a so-called multi-play system integrates networked entertainment and communications systems. Using a mobile phone, all those services can be controlled and used ubiquitously—from
Towards Privacy in Enterprise Directory Services: A User-Centric Approach to Attribute Management
TLDR
This work proposes combining public key infrastructure, user-centric identity management, and EDS to allow users control of the personal information stored within a directory as well as who is allowed to access that information.
A Context Modeling Survey
TLDR
This paper provides a survey of the the most relevant current approaches to modeling context for ubiquitous computing, reviewed, classified relative to their core elements and evaluated with respect to their appropriateness.
...
...