Identity management and trusted interaction in internet and mobile computing
Title | Identity management and trusted interaction in internet and mobile computing |
Publication Type | Journal Article |
Year of Publication | 2014 |
Authors | Jøsang, A. |
Journal | Information Security, IET |
Volume | 8 |
Pagination | 67-79 |
Date Published | March |
ISSN | 1751-8709 |
Keywords | business models, Computer crime, Identity management, Internet, Investment, marketing data processing, mobile computing, mobile services, online markets, online services, potent access capability, security, security of data, sustainable development, Trusted Computing, trusted interaction |
Abstract | The convergence of the Internet and mobile computing enables personalised access to online services anywhere and anytime. This potent access capability creates opportunities for new business models which stimulates vigorous investment and rapid innovation. Unfortunately, this innovation also produces new vulnerabilities and threats, and the new business models also create incentives for attacks, because criminals will always follow the money. Unless the new threats are balanced with appropriate countermeasures, growth in the Internet and mobile services will encounter painful setbacks. Security and trust are two fundamental factors for sustainable development of identity management in online markets and communities. The aim of this study is to present an overview of the central aspects of identity management in the Internet and mobile computing with respect to security and trust. |
DOI | 10.1049/iet-ifs.2012.0133 |
Citation Key | 6748541 |