• Corpus ID: 56461130

Vis-a-Vis Verification: Social Network Identity Management Through Real World Interactions

  title={Vis-a-Vis Verification: Social Network Identity Management Through Real World Interactions},
  author={Marco Maier and Chadly Marouane and Claudia Linnhoff-Popien and Benno Rott and Stephan A. W. Verclas},
Online services, particularly those aimed at a specific user base such as a company’s employees, face the problem of identity management. Especially when the service constitutes some kind of social network, i.e., the validity of the users’ identities matters, secure and reliable means for identity verification and authentication are required. In this paper, we propose a novel identity management concept based on a) verification through physical presence and b) authentication through ownership… 

Figures from this paper

Vis-a-Vis : Offline-Capable Management of Virtual Trust Structures Based on Real-Life Interactions
This extended version of this paper presents the newly proposed Tree of Trust structure in more detail, and provides an explanation how the system can be used in a technically more distributed manner, even supporting offline operation.
Mobile Authentisierung im Unternehmensalltag
Stellen wir ein Konzept zur sicheren Verwaltung of Zugangsberechtigungen im Unternehmensumfeld vor, which soll die Anforderungen bezüglich Sicherheit, Usability and Einsatz im Unteiligingskontext berücksichtigen.
Proximitäts- und Aktivitätserkennung mit mobilen Endgeräten
Das erste Verfahren benutzt WLAN-Signale aus der Umgebung, um sichere, d.h. unfalschbare, Location Tags zu generieren, mit denen ein privatsphare-schonender Proximitatstest durchgefuhrt werden kann.
Glycoside Hydrolase Family 43 from Paenibacillus curdlanolyticus Strain B-6; An Accessory Enzyme to Enhance the Hydrolysis of Pretreated Rice Straw
New enzymatic properties of GH43 were proposed which showed the ability to enhance biomass biorefinery efficiency and boosting effect and increase in liberated reducing sugar as a result of Xyl43B6/endo-xylanase synergy.


Client-Side Defense Against Web-Based Identity Theft
A framework for client-side defense is proposed: a browser plug-in that examines web pages and warns the user when requests for data may be part of a spoof attack.
Trust Networks on the Semantic Web
The applicability of social network analysis to the semantic web, particularly discussing the multi-dimensional networks that evolve from ontological trust specifications, is described.
Authentication Using Mobile Phone as a Security Token
In this paper several different authentication solutions using the mobile as authentication token are discussed, where these solutions vary in complexity, strength, security and user friendliness.
Design methods for Security and Trust
This work outlines a methodology for the design of secure and trusted electronic embedded systems, which builds on identifying the secure-sensitive part of a system (the root-of-trust) and iteratively partitioning and protecting that root- of-trust over all levels of design abstraction.
The most dangerous code in the world: validating SSL certificates in non-browser software
It is demonstrated that SSL certificate validation is completely broken in many security-critical applications and libraries and badly designed APIs of SSL implementations and data-transport libraries which present developers with a confusing array of settings and options are analyzed.
The official PGP user's guide
This tutorial discusses how public key cryptography works installing PGP using PGP managing keys advanced topics beware of snake oil and a peek under the hood vulnerabilities.
A Tree of Trust rooted in Extended Trusted Computing
A pedestal scaffold type having a base member, a telescopic mast mounted vertically on the base member and a work cage mounted in cantilever manner from the upper end of the mast. The majority of the
Key ict data for the world
  • http://www.itu.int/en/ITU-D/Statistics/Pages/stat/default.aspx, 2013, last accessed date: 2013-07-18.
  • 2013