Visible to the public Identity management and trusted interaction in internet and mobile computing

TitleIdentity management and trusted interaction in internet and mobile computing
Publication TypeJournal Article
Year of Publication2014
AuthorsJøsang, A.
JournalInformation Security, IET
Volume8
Pagination67-79
Date PublishedMarch
ISSN1751-8709
Keywordsbusiness models, Computer crime, Identity management, Internet, Investment, marketing data processing, mobile computing, mobile services, online markets, online services, potent access capability, security, security of data, sustainable development, Trusted Computing, trusted interaction
Abstract

The convergence of the Internet and mobile computing enables personalised access to online services anywhere and anytime. This potent access capability creates opportunities for new business models which stimulates vigorous investment and rapid innovation. Unfortunately, this innovation also produces new vulnerabilities and threats, and the new business models also create incentives for attacks, because criminals will always follow the money. Unless the new threats are balanced with appropriate countermeasures, growth in the Internet and mobile services will encounter painful setbacks. Security and trust are two fundamental factors for sustainable development of identity management in online markets and communities. The aim of this study is to present an overview of the central aspects of identity management in the Internet and mobile computing with respect to security and trust.

DOI10.1049/iet-ifs.2012.0133
Citation Key6748541