Skip to main content
Top

2014 | Book

Architecting User-Centric Privacy-as-a-Set-of-Services

Digital Identity-Related Privacy Framework

insite
SEARCH

About this book

How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author’s vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.

Table of Contents

Frontmatter
Chapter 1. Introduction and Motivations
Abstract
The advent of Internet-compliant technologies and open standards are easing the extension of information systems by lowering the barriers to connecting disparate business applications both within and across corporate boundaries. Increasingly, information technology architects are asked to define end-to-end business processes that span borders to enable inter-enterprise collaborations and mass integration with partners.
Ghazi Ben Ayed

Cyber-security

Frontmatter
Chapter 2. Digital Identity
Abstract
Having an identity and expressing it have been of that importance from the early time. Inscribed ostrich shell fragments found in Diepkloof Rock Shelter in Western Cape, South Africa are among the earliest examples of the use of symbolism as a form of expressing identity.
Ghazi Ben Ayed
Chapter 3. Digital Identity Management
Abstract
In this chapter, we present a literature review on the definitions of Digital Identity Management (DigIdM), various origins of identity silos, and digital identity management technical models. We provide also a comparison between digital identity management technical models and then we explain the basics of a new technical approach that is based on global Web digital identity management. We highlight the contributions of user-centric digital identity management. Finally, we explain a metadata-based approach to make digital identity less visible in order to give users more control on persistent digital identity.
Ghazi Ben Ayed
Chapter 4. Privacy and Digital Identity
Abstract
Privacy is a human right and an important need for societies to progress. It is considered as a requirement for maintaining the human condition with dignity and respect (Schneier in The eternal value of privacy, 2006).
Ghazi Ben Ayed

Interoperability Through Service-Orientation

Frontmatter
Chapter 5. DigIdeRP Framework
Abstract
We cover in this chapter three main areas. The first area deals with the foundations and basic concepts of service orientation and service-oriented architecture. The second one deals with a high level and detailed descriptions of DigIdeRP framework. In the last area, we present and describe each block that composes SoaML-based DigIdeRP framework.
Ghazi Ben Ayed
Chapter 6. SOA-Artifacts-Level: Implementation of Privacy-as-a-Set-of-Services
Abstract
We use MagicDraw UML (version 16.5) software with Cameo SOA+ extension (version 16.5) to design the system with SoaML diagrams.
Ghazi Ben Ayed

Conclusion and Outlook

Frontmatter
Chapter 7. Conclusion and Outlook
Abstract
Privacy is becoming an important issue and its importance will continue to grow over time. In the header of CNIL web site, it is mentioned that “information technology must respect the human identity, the human rights, privacy and liberties”. We believe that technology is far to be our enemy and can play a key role as a tool to protect human identity, the human rights, privacy and liberties if it is well implemented and used.
Ghazi Ben Ayed
Backmatter
Metadata
Title
Architecting User-Centric Privacy-as-a-Set-of-Services
Author
Ghazi Ben Ayed
Copyright Year
2014
Electronic ISBN
978-3-319-08231-8
Print ISBN
978-3-319-08230-1
DOI
https://doi.org/10.1007/978-3-319-08231-8