A Privacy Enhanced Service Architecture for Mobile Users
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Digital Identity
The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition
The 3G IP Multimedia Subsystem (IMS): Merging the Internet and the Cellular Worlds, Second Edition
User centricity: a taxonomy and open issues
Proceedings of the second ACM workshop on Digital identity management
User-centric privacy management for federated identity management
COLCOM '07 Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
Identity management and web services as service ecosystem drivers in converged networks
IEEE Communications Magazine
IEEE Communications Magazine
Flexible single sign-on for SIP: bridging the identity chasm
ICC'09 Proceedings of the 2009 IEEE international conference on Communications
Quantum Secure Communication Network Protocol with Entangled Photons for Mobile Communications
Mobile Networks and Applications
Hi-index | 0.00 |
The subscribers' personal information and services that mobile operators are able to provide to Web developers offer new and exciting possibilities in numerous domains. However, bringing mobile information services to the Web to enable a new generation of mobile Web services presents several research challenges on identity and privacy management. In this paper, we describe a framework for identity management in mobile services that empowers users to govern the use and release of their personal information. Our framework is based on a brokering approach that intermediates between the mobile operator's information services and the Web service providers. By leveraging on Web services, identity management infrastructure and privacy enhancing technologies, our framework provides an effective, privacy-considerate delivery of services over the mobile Web environment. This paper describes the design principles and architecture of the framework as well as the feasibility, applicability and user-experience evaluation we have carried out.