Attribute-based Credentials for Trust


Book Description

The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them in actual production pilots, allowing provably accredited members of restricted communities to provide anonymous feedback on their community or its members. To date, credentials such as digitally signed pieces of personal information or other information used to authenticate or identify a user have not been designed to respect the users’ privacy. They inevitably reveal the identity of the holder even though the application at hand often needs much less information, e.g. only the confirmation that the holder is a teenager or is eligible for social benefits. In contrast, Privacy-ABCs allow their holders to reveal only their minimal information required by the applications, without giving away their full identity information. Privacy-ABCs thus facilitate the implementation of a trustworthy and at the same time privacy-respecting digital society. The ABC4Trust project as a multidisciplinary and European project, gives a technological response to questions linked to data protection. Viviane Reding (Former Vice-president of the European Commission, Member of European Parliament)




Attribute-Based Access Control


Book Description

This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.




Open and Big Data Management and Innovation


Book Description

This book constitutes the refereed conference proceedings of the 14th IFIP WG 6.11 Conference on e-Business, e-Services and e-Society, I3E 2015, held in Delft, The Netherlands, in October 2015. The 40 revised full papers presented together with 1 keynote panel were carefully reviewed and selected from 65 submissions. They are organized in the following topical sections: adoption; big and open data; e-business, e-services,, and e-society; and witness workshop.




Global Fintech


Book Description

How the global financial services sector has been transformed by artificial intelligence, data science, and blockchain. Artificial intelligence, big data, blockchain, and other new technologies have upended the global financial services sector, creating opportunities for entrepreneurs and corporate innovators. Venture capitalists have helped to fund this disruption, pouring nearly $500 billion into fintech over the last five years. This book offers global perspectives on technology-fueled transformations in financial services, with contributions from a wide-ranging group of academics, industry professionals, former government officials, and current government advisors. They examine not only the struggles of rich countries to bring the old analog world into the new digital one but also the opportunities for developing countries to “leapfrog” directly into digital. The book offers accessible explanations of blockchain and distributed ledger technology and explores big data analytics. It considers, among other things, open banking, platform-based strategies for banks, and digital financial services. Case studies imagine possible future fintech-government interaction, emphasizing that legal and regulatory frameworks can help to create trust in financial processes. The contributors offer novel takes and unexpected insights that will be of interest to fintech experts and nonexperts alike. Contributors Ajay Bhalla, Michelle Chivunga, John D’Agostino, Mark Flood, Amias Moore Gerety, Oliver R. Goodenough, Thomas Hardjono, Sharmila Kassam, Boris Khentov, Alexander Lipton, Lev Menand, Pinar Ozcan, Alex Pentland, Matthew Reed, David L. Shrier, Markos Zachariadis




Internet of Things and Access Control


Book Description

This book presents the design and development of an access control architecture for the Internet of Things (IoT) systems. It considers the significant authentication and authorization issues for large-scale IoT systems, in particular, the need for access control, identity management, delegation of access rights and the provision of trust within such systems. It introduces a policy-based access control approach for the IoT that provides fine-grained access for authorized users to services while protecting valuable resources from unauthorized access. Further, the book discusses an identity-less, asynchronous and decentralized delegation model for the IoT leveraging the advantage of blockchain technology. It also presents an approach of attribute-based identity and examines the notion of trust in an IoT context by considering the uncertainty that exists in such systems. Fully explaining all the techniques used, the book is of interest to engineers, researchers and scientists working in the field of the wireless sensor networks, IoT systems and their access control management.




Proceedings of the Eleventh International Network Conference (INC 2016)


Book Description

This book contains the proceedings of the Eleventh International Network Conference (INC 2016), which was held in Frankfurt, Germany, in July 2016. A total of 30 papers were accepted for inclusion in the conference. The main topics of the book include: Network Technologies; Mobile and Wireless Networking; Security and Privacy; Applications and Impacts. The papers address state-of-the-art research and applications of network technology, arising from both the academic and industrial domains. These proceedings should consequently be of interest to network practitioners, researchers, academics, and technical managers involved in the design, development and use of network systems.




Advanced Parallel Processing Technologies


Book Description

Welcome to the proceedings of APPT 2005: the 6th International Workshop on Advanced Parallel Processing Technologies. APPT is a biennial workshop on parallel and distributed processing. Its scope covers all aspects of parallel and distributed computing technologies, including architectures, software systems and tools, algorithms, and applications. APPT originated from collaborations by researchers from China and Germany and has evolved to be an international workshop. APPT 2005 was the sixth in the series. The past ?ve workshops were held in Beijing, Koblenz, Changsha, Ilmenau, and Xiamen, respectively. The Program Committee is pleased to present the proceedings for APPT 2005. This year, APPT 2005 received over 220 submissions from researchers all over the world. All the papers were peer reviewed by two to three Program Committee members on their relevance, originality, signi?cance, technical qu- ity, and presentation. Based on the review result, 55 high-quality papers were selected to be included in the proceedings. The papers in this volume represent the forefront of research on parallel processing and related ?elds by researchers from China, Germany, USA, Korea, India, and other countries. The papers - cepted cover a wide range of exciting topics, including architectures, software, networking, and applications.




Privacy and Identity Management for Life


Book Description

At the end of the PrimeLife EU project, a book will contain the main research results. It will address primarily researchers. In addition to fundamental research it will contain description of best practice solutions.




Handbook of Research on E-Business Standards and Protocols: Documents, Data and Advanced Web Technologies


Book Description

Electronic business is a major force shaping the digital world. Yet, despite of years of research and standardization efforts, many problems persist that prevent e-business from achieving its full potential. Problems arise from different data vocabularies, classification schemas, document names, structures, exchange formats and their varying roles in business processes. Non-standardized business terminology, lack of common acceptable and understandable processes (grammar), and lack of common dialog rules (protocols) create barriers to improving electronic business processes. Handbook of Research on E-Business Standards and Protocols: Documents, Data and Advanced Web Technologies contains an overview of new achievements in the field of e-business standards and protocols, offers in-depth analysis of and research on the development and deployment of cutting-edge applications, and provides insight into future trends. This book unites new research that promotes harmony and agreement in business processes and attempts to choreograph business protocols and orchestrate semantic alignment between their vocabularies and grammar. Additionally, this Handbook of Research discusses new approaches to improving standards and protocols, which include the use of intelligent agents and Semantic Web technology.




IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications


Book Description

IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.