David Bourget (Western Ontario)
David Chalmers (ANU, NYU)
Rafael De Clercq
Ezio Di Nucci
Jack Alan Reynolds
Learn more about PhilPapers
Matteo Gaeta, Juergen Jaehnert, Kleopatra Konstanteli, Sergio Miranda, Pierluigi Ritrovato & Theodora Varvarigou
Identity in the Information Society 2 (2):115-136 (2009)
Over the past few years, the Virtual Organization (VO) paradigm has been emerging as an ideal solution to support collaboration among globally distributed entities (individuals and/or organizations). However, due to rapid technological and societal changes, there has also been an astonishing growth in technologies and services for mobile users. This has opened up new collaborative scenarios where the same participant can access the VO from different locations and mobility becomes a key issue for users and services. The nomadicity and mobility introduces additional challenges for managing collaboration in VO environments. This paper focuses on the Identity Management challenge in a Mobile Dynamic VO environment, which is a VO that takes into account nomadicity and seamless mobility aspects as elaborated within the EU funded project Akogrimo (Access to Knowledge through the Grid in a mobile world). The resulting work is the design of the Akogrimo Identity Management system supporting the authentication and authorization process across the different administrative domains of the Mobile Dynamic VO. This design follows the service oriented approach and integrates the different perspectives: that of the network, that of the user and that of the service provider. Such an integration requires facing challenges; both from the architectural and technological viewpoints because different ‘worlds’ (i.e. network and service level) leverage different (and sometimes conflicting) approaches when addressing Identity Management.
|Keywords||Identity management Next generation grid Next generation network SOA SSO Virtual organization Web services|
|Categories||categorize this paper)|
Setup an account with your affiliations in order to access resources via your University's proxy server
Configure custom proxy (use this if your affiliation does not provide a proxy)
|Through your library|
References found in this work BETA
No references found.
Citations of this work BETA
No citations found.
Similar books and articles
Theodora Varvarigou & Vassiliki Andronikou (2009). Identity Management in GRID Computing and Service Oriented Architectures: Research and Practice. [REVIEW] Identity in the Information Society 2 (2):95-98.
Matthias Assel, Stefan Wesner & Alexander Kipp (2009). A Security Framework for Dynamic Collaborative Working Environments. Identity in the Information Society 2 (2):171-187.
Noëmi Manders-Huits (2010). Practical Versus Moral Identities in Identity Management. Ethics and Information Technology 12 (1):43-55.
Hidehito Gomi (2010). A Persistent Data Tracking Mechanism for User-Centric Identity Governance. Identity in the Information Society 3 (3):639-656.
Lothar Fritsch, Kristin Skeide Fuglerud & Ivar Solheim (2010). Towards Inclusive Identity Management. Identity in the Information Society 3 (3):515-538.
María De-Miguel-Molina & Mónica Martínez-Gómez (2011). A Comparative Empirical Study on Mobile ICT Services, Social Responsibility and the Protection of Children. Science and Engineering Ethics 17 (2):245-270.
Adrian Rahaman & Martina Angela Sasse (2010). A Framework for the Lived Experience of Identity. Identity in the Information Society 3 (3):605-638.
Eleni Kosta, Olli Pitkänen, Marketta Niemelä & Eija Kaasinen (2010). Mobile-Centric Ambient Intelligence in Health- and Homecare—Anticipating Ethical and Legal Challenges. Science and Engineering Ethics 16 (2):303-323.
Niki A. den Nieuwenboer & Muel Kaptein (2008). Spiraling Down Into Corruption: A Dynamic Analysis of the Social Identity Processes That Cause Corruption in Organizations to Grow. [REVIEW] Journal of Business Ethics 83 (2):133-146.
Niki A. Den Nieuwenboer & Muel Kaptein (2008). Spiraling Down Into Corruption: A Dynamic Analysis of the Social Identity Processes That Cause Corruption in Organizations to Grow. Journal of Business Ethics 83 (2):133 - 146.
Giulio Galiero & Gabriele Giammatteo (2009). Trusting Third-Party Storage Providers for Holding Personal Information. A Context-Based Approach to Protect Identity-Related Data in Untrusted Domains. Identity in the Information Society 2 (2):99-114.
Dmitriy Alexeev (2008). Услуги с добавленной стоимостью как новая техносоциальная реальность. Proceedings of the Xxii World Congress of Philosophy 48:77-86.
M. R. Hyman & C. W. King (forthcoming). The Geographically Mobile Consumer: A Conceptual Framework for Retail Management and Patronage Theory Development. Patronage Behavior and Retail Management Conference Proceedings.
Added to index2010-12-05
Total downloads8 ( #370,603 of 1,790,336 )
Recent downloads (6 months)1 ( #431,681 of 1,790,336 )
How can I increase my downloads?