This article is
- freely available
Supporting Trust and Privacy with an Identity-Enabled Architecture
NEC Laboratories Europe, Kurfürstenanlage 36, 69115 Heidelberg, Germany
* Author to whom correspondence should be addressed.
Received: 1 September 2012; in revised form: 24 September 2012 / Accepted: 25 October 2012 / Published: 19 November 2012
Abstract: Cost reduction and a vastly increased potential to create new services, such as via the proliferation of the Cloud, have led to many more players and “end points”. With many of them being new entrants, possibly short-lived, the question of how to handle trust and privacy in this new context arises. In this paper, we specifically look at the underlying infrastructure that connects end-points served by these players, which is an essential part of the overall architecture to enable trust and privacy. We present an enhanced architecture that allows real people, objects and services to reliably interact via an infrastructure providing assured levels of trust.
Keywords: identity; privacy; trust; virtual identity; virtual infrastructure session; identity aggregator; cloud
Article StatisticsClick here to load and display the download statistics.
Notes: Multiple requests from the same IP address are counted as one view.
Cite This Article
MDPI and ACS Style
Sarma, A.; Girao, J. Supporting Trust and Privacy with an Identity-Enabled Architecture. Future Internet 2012, 4, 1016-1025.
Sarma A, Girao J. Supporting Trust and Privacy with an Identity-Enabled Architecture. Future Internet. 2012; 4(4):1016-1025.
Sarma, Amardeo; Girao, Joao. 2012. "Supporting Trust and Privacy with an Identity-Enabled Architecture." Future Internet 4, no. 4: 1016-1025.