2012
DOI: 10.1007/978-3-642-30436-1_6
|View full text |Cite
|
Sign up to set email alerts
|

OFELIA – A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management

Abstract: Abstract. Personal mobile devices with real practical computational power and Internet connectivity are currently widespread throughout all levels of society. This is so much so that the most popular of these devices, the smart phone, in all its varied ubiquitous manifestations is nowadays the de facto personal mobile computing platform, be it for civil or even military applications. In parallel with these developments, Internet application providers like Google and Facebook are developing and deploying an eve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2012
2012
2022
2022

Publication Types

Select...
3
2
1

Relationship

2
4

Authors

Journals

citations
Cited by 8 publications
(14 citation statements)
references
References 15 publications
0
14
0
Order By: Relevance
“…In this integrated view, a patient can select a part of his/her EHR and view in more detail who is accessing it and for what purpose. An example of such a tool was proposed in [20] and its security and privacy requirements have already been studied on previous research [21] [22]. Even less seems to exist about transparency and privacy in EHR.…”
Section: Transparency Enhancing Toolsmentioning
confidence: 99%
See 1 more Smart Citation
“…In this integrated view, a patient can select a part of his/her EHR and view in more detail who is accessing it and for what purpose. An example of such a tool was proposed in [20] and its security and privacy requirements have already been studied on previous research [21] [22]. Even less seems to exist about transparency and privacy in EHR.…”
Section: Transparency Enhancing Toolsmentioning
confidence: 99%
“…In access control, obligations can be performed on a GRANT or DENY of an access request, for example, when a BTG is requested, an obligation can be triggered to send an email to the responsible authority to check whether that BTG access was valid or not; AUTH: European Directives [1] state that there needs to be a description of how personal data must be collected and processed. Regarding access control, this data can refer to patient's identification and authentication information (e.g., including patient's credentials for authentication and authorisation); SECAUTH: Secure authentication mechanisms with unique identification cards and one time passwords as well as secure authentication and authorization features are proposed in [21];…”
Section: Access Controlmentioning
confidence: 99%
“…Architecturally, PACVIM integrates with OFELIA (Open Federated Environments Leveraging Identity and Authorization), a prototype system to perform registration, authentication and authorisation to EHRs [16]. From the human interaction's point of view, PACVIM uses visual access control tools commonly employed nowadays to browse social networks.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore providing a practical solution for the users Internet reachability challenge [8]. The use of smartphones for identity management is currently also recognized as essential for enhancing security and privacy [9,10,11] and has been proved to play a crucial role on more flexible user-centric models [12,13]. Based on these facts, the proposed architecture adopt the use of smartphones as an Authorization Broker in order to grant users a dynamic and more active role over their identity attributes.…”
Section: Proposed Solutionmentioning
confidence: 99%
“…These authorization take the form of conditional, temporal limited and easily revocable by the data owners. [7,13] …”
Section: Identity Managementmentioning
confidence: 99%