Projects per year
Abstract
Enhancing trust among service providers and end-users with respect to data protection is an urgent ma.er in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level of security than other current solutions. CREDENTIAL enables end-to-end confidentiality and authenticity as well as improved privacy in cloud-based identity management and data sharing scenarios. In this paper, besides clarifying the vision and use cases, we focus on the adoption of CREDENTIAL. Firstly, for adoption by providers, we elaborate on the functionality of CREDENTIAL, the services implementing these functions, and the physical architecture needed to deploy such services. Secondly, we investigate factors from related research that could be used to facilitate CREDENTIAL's adoption and list key benefits as convincing arguments.
Original language | English |
---|---|
Title of host publication | ARES 2017 - Proceedings of the 12th International Conference on Availability, Reliability and Security |
Publisher | Association of Computing Machinery |
Pages | 1–7 |
Volume | Part F130521 |
ISBN (Electronic) | 978-1-4503-5257-4 |
DOIs | |
Publication status | Published - 29 Aug 2017 |
Event | 12th International Conference on Availability, Reliability and Security: ARES 2017 - Reggio Calabria, Italy Duration: 29 Aug 2017 → 1 Sept 2017 |
Conference
Conference | 12th International Conference on Availability, Reliability and Security |
---|---|
Country/Territory | Italy |
City | Reggio Calabria |
Period | 29/08/17 → 1/09/17 |
Keywords
- Access control
- Data sharing
- Identity management
- Proxy re-encryption
- User adoption
ASJC Scopus subject areas
- Human-Computer Interaction
- Computer Networks and Communications
- Computer Vision and Pattern Recognition
- Software
Fingerprint
Dive into the research topics of 'Towards the Adoption of Secure Cloud Identity Services'. Together they form a unique fingerprint.Projects
- 1 Finished