Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Towards the Adoption of Secure Cloud Identity Services
Hellenic Telecommunications Organization R&D Athens, Greece, GRC.
Hellenic Telecommunications Organization R&D, Athens, Greece, GRC.
Hellenic Telecommunications Organization R&D, Athens, Greece, GRC.
Karlstad University, Faculty of Arts and Social Sciences (starting 2013), Karlstad Business School (from 2013). (HumanIT)ORCID iD: 0000-0001-6826-3358
Show others and affiliations
2017 (English)In: ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security, New York: Association for Computing Machinery (ACM), 2017, p. 1-7, article id 90Conference paper, Published paper (Refereed)
Abstract [en]

Enhancing trust among service providers and end-users with respect to data protection is an urgent matter in the growing information society. In response, CREDENTIAL proposes an innovative cloud-based service for storing, managing, and sharing of digital identity information and other highly critical personal data with a demonstrably higher level of security than other current solutions. CREDENTIAL enables end-to-end con€dentiality and authenticity as well as improved privacy in cloud-based identity management and data sharing scenarios. In this paper, besides clarifying the vision and use cases, we focus on the adoption of CREDENTIAL. Firstly, for adoption by providers, we elaborate on the functionality of CREDENTIAL, the services implementing these functions, and the physical architecture needed to deploy such services. Secondly, we investigate factors from related research that could be used to facilitate CREDENTIAL's adoption and list key bene€ts as convincing arguments.

Place, publisher, year, edition, pages
New York: Association for Computing Machinery (ACM), 2017. p. 1-7, article id 90
Keywords [en]
Data sharing, access control, identity management, user adoption, proxy re-encryption
National Category
Information Systems, Social aspects Computer Systems
Research subject
Computer Science; Information Systems
Identifiers
URN: urn:nbn:se:kau:diva-62737DOI: 10.1145/3098954.3104061ISI: 000426964900090ISBN: 978-1-4503-5257-4 (electronic)OAI: oai:DiVA.org:kau-62737DiVA, id: diva2:1135433
Conference
SECPID 2017, The 2nd Workshop on Security, Privacy, and Identity Management in the Cloud (within ARES EU Projects Symposium 2017), Reggio Calabria, Italy, August 29- September 01, 2017.
Projects
CREDENTIAL
Funder
EU, Horizon 2020, 653454Available from: 2017-08-23 Created: 2017-08-23 Last updated: 2020-12-10Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textCREDENTIAL publicationsAthens University of Economics and Business

Authority records

Pettersson, John Sören

Search in DiVA

By author/editor
Pettersson, John Sören
By organisation
Karlstad Business School (from 2013)
Information Systems, Social aspectsComputer Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 244 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • apa.csl
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf