{"title":"Risk assessment for better Identity Management in pervasive environments","authors":"Patricia Arias Cabarcos","doi":"10.1109/PERCOMW.2011.5766913","DOIUrl":null,"url":null,"abstract":"Pervasive computing environments comprise a myriad of devices. In this framework, interactions take place between different parties to simplify users' everyday life in a natural and transparent manner. These interactions, that are generally oriented to the delivery of services, usually involve the exchange of identity information and personal data over the networks. Since transactions may occur between familiar or unfamiliar entities, Identity Management (IdM) becomes indispensable to avoid security problems. Here, we aim to show that risk evaluation must be considered as a key enabler to foster collaboration between parties in a dynamic but yet secure manner. Taking this premise as a foundation, we are designing a methodology to assess risk. We also aim to integrate risk assessment with trust evaluation in order to aid in decision-making procedures, allowing the construction of flexible and dynamic IdM systems that are more suitable to be deployed in pervasive scenarios.","PeriodicalId":369430,"journal":{"name":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"9","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/PERCOMW.2011.5766913","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 9
Abstract
Pervasive computing environments comprise a myriad of devices. In this framework, interactions take place between different parties to simplify users' everyday life in a natural and transparent manner. These interactions, that are generally oriented to the delivery of services, usually involve the exchange of identity information and personal data over the networks. Since transactions may occur between familiar or unfamiliar entities, Identity Management (IdM) becomes indispensable to avoid security problems. Here, we aim to show that risk evaluation must be considered as a key enabler to foster collaboration between parties in a dynamic but yet secure manner. Taking this premise as a foundation, we are designing a methodology to assess risk. We also aim to integrate risk assessment with trust evaluation in order to aid in decision-making procedures, allowing the construction of flexible and dynamic IdM systems that are more suitable to be deployed in pervasive scenarios.