By Topic

Risk assessment for better Identity Management in pervasive environments

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

1 Author(s)
Patricia Arias Cabarcos ; Telematics Department, University Carlos III, Leganés, Madrid (Spain)

Pervasive computing environments comprise a myriad of devices. In this framework, interactions take place between different parties to simplify users' everyday life in a natural and transparent manner. These interactions, that are generally oriented to the delivery of services, usually involve the exchange of identity information and personal data over the networks. Since transactions may occur between familiar or unfamiliar entities, Identity Management (IdM) becomes indispensable to avoid security problems. Here, we aim to show that risk evaluation must be considered as a key enabler to foster collaboration between parties in a dynamic but yet secure manner. Taking this premise as a foundation, we are designing a methodology to assess risk. We also aim to integrate risk assessment with trust evaluation in order to aid in decision-making procedures, allowing the construction of flexible and dynamic IdM systems that are more suitable to be deployed in pervasive scenarios.

Published in:

Pervasive Computing and Communications Workshops (PERCOM Workshops), 2011 IEEE International Conference on

Date of Conference:

21-25 March 2011