skip to main content
10.1145/3197768.3201563acmotherconferencesArticle/Chapter ViewAbstractPublication PagespetraConference Proceedingsconference-collections
research-article

Building Blocks for Identity Management and Protection for Smart Environments and Interactive Assistance Systems

Published: 26 June 2018 Publication History

Abstract

Interactive environments are more and more entering our daily life. Our homes are becoming increasingly smart and so do our working environments. Aiming to provide assistance that is not only suitable to the current situation, but as well for the involved individuals usually comes along with an increased scale of personal data being collected/requested and processed. While this may not be exceptionally critical as long as data does not leave one's smart home, circumstances change dramatically once smart home data is processed by cloud services, and, all the more, as soon as an interactive assistance system is operated by our employer who may have interest in exploiting the data beyond its original purpose, e. g. for secretly evaluating the work performance of his personnel. In this paper we discuss how a federated identity management could be augmented with distributed usage control and trusted computing technology so as to reliably arrange and enforce privacy-related requirements in externally operated interactive environments.

References

[1]
Trusted Computing Group. {n. d.}. TCG architecture overview. (TCG Specification). ({n. d.}).
[2]
Dick Hardt. 2012. The OAuth 2.0 authorization framework. (2012).
[3]
Eve Maler. 2010. Controlling Data Usage with User-Managed Access (UMA). In W3C Privacy and Data Usage Control Workshop, Cambridge.
[4]
John Marchesini, Sean W Smith, Omen Wild, Josh Stabiner, and Alex Barsamian. 2004. Open-source applications of TCPA hardware. In Computer Security Applications Conference, 2004. 20th Annual. IEEE, 294--303.
[5]
Jaehong Park and Ravi Sandhu. 2004. The UCON ABC usage control model. ACM Transactions on Information and System Security (TISSEC) 7, 1 (2004), 128--174.
[6]
Alexander Pretschner, Manuel Hilty, and David Basin. 2006. Distributed usage control. Commun. ACM 49, 9 (2006), 39--44.
[7]
Reiner Sailer, Xiaolan Zhang, Trent Jaeger, and Leendert Van Doorn. 2004. Design and Implementation of a TCG-based Integrity Measurement Architecture. In USENIX Security Symposium, Vol. 13. 223--238.
[8]
Nat Sakimura, John Bradley, Mike Jones, Breno de Medeiros, and Chuck Mortimore. 2014. OpenID Connect Core 1.0 incorporating errata set 1. The OpenID Foundation, specification (2014).
[9]
Ravi Sandhu and Xinwen Zhang. 2005. Peer-to-peer access control architecture using trusted computing technology. In Proceedings of the tenth ACM symposium on Access control models and technologies. ACM, 147--158.
[10]
Paul Sevinç, Mario Strasser, and David Basin. 2007. Securing the distribution and storage of secrets with trusted platform modules. Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems (2007), 53--66.

Cited By

View all
  • (2023)Digital Sovereignty: What it is and why it matters for HCIExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585834(1-7)Online publication date: 19-Apr-2023
  • (2023)Human-Centred Digital Sovereignty: Explorative Conceptual Model and Ways ForwardComputer-Human Interaction Research and Applications10.1007/978-3-031-49368-3_6(84-103)Online publication date: 23-Dec-2023
  • (2018)Identity Management and Protection Motivated by the General Data Protection Regulation of the European Union—A Conceptual Framework Based on State-of-the-Art Software TechnologiesTechnologies10.3390/technologies60401156:4(115)Online publication date: 4-Dec-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
PETRA '18: Proceedings of the 11th PErvasive Technologies Related to Assistive Environments Conference
June 2018
591 pages
ISBN:9781450363907
DOI:10.1145/3197768
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • NSF: National Science Foundation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 June 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Distributed Usage Control
  2. Identity Management
  3. Interactive Environments
  4. Remote Attestation
  5. Smart Assistance Systems
  6. Trusted Platform Module
  7. Trusted Reference Monitor

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

PETRA '18

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)7
  • Downloads (Last 6 weeks)1
Reflects downloads up to 10 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Digital Sovereignty: What it is and why it matters for HCIExtended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544549.3585834(1-7)Online publication date: 19-Apr-2023
  • (2023)Human-Centred Digital Sovereignty: Explorative Conceptual Model and Ways ForwardComputer-Human Interaction Research and Applications10.1007/978-3-031-49368-3_6(84-103)Online publication date: 23-Dec-2023
  • (2018)Identity Management and Protection Motivated by the General Data Protection Regulation of the European Union—A Conceptual Framework Based on State-of-the-Art Software TechnologiesTechnologies10.3390/technologies60401156:4(115)Online publication date: 4-Dec-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media