Towards the Adoption of Secure Cloud Identity Services

Alexandros Kostopoulos, Evangelos Sfakianakis, Ioannis Chochliouros, John Sören Pettersson, Stephan Krenn, Welderufael Tesfay, Andrea Migliavacca, Felix Hörandner

Publikation: Beitrag in Buch/Bericht/KonferenzbandBeitrag in einem KonferenzbandBegutachtung

Abstract

Enhancing trust among service providers and end-users with respect to data protection is an urgent ma.er in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level of security than other current solutions. CREDENTIAL enables end-to-end confidentiality and authenticity as well as improved privacy in cloud-based identity management and data sharing scenarios. In this paper, besides clarifying the vision and use cases, we focus on the adoption of CREDENTIAL. Firstly, for adoption by providers, we elaborate on the functionality of CREDENTIAL, the services implementing these functions, and the physical architecture needed to deploy such services. Secondly, we investigate factors from related research that could be used to facilitate CREDENTIAL's adoption and list key benefits as convincing arguments.

Originalspracheenglisch
TitelARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security
Herausgeber (Verlag)Association of Computing Machinery
Seiten1–7
BandPart F130521
ISBN (elektronisch)978-1-4503-5257-4
DOIs
PublikationsstatusVeröffentlicht - 29 Aug. 2017
Veranstaltung12th International Conference on Availability, Reliability and Security: ARES 2017 - Reggio Calabria, Italien
Dauer: 29 Aug. 20171 Sep. 2017

Konferenz

Konferenz12th International Conference on Availability, Reliability and Security
Land/GebietItalien
OrtReggio Calabria
Zeitraum29/08/171/09/17

ASJC Scopus subject areas

  • Human-computer interaction
  • Computernetzwerke und -kommunikation
  • Maschinelles Sehen und Mustererkennung
  • Software

Fingerprint

Untersuchen Sie die Forschungsthemen von „Towards the Adoption of Secure Cloud Identity Services“. Zusammen bilden sie einen einzigartigen Fingerprint.

Dieses zitieren