Chapter 25

Online Identity and User Management Services

Tewfiq El Maliki1,    University of Applied Sciences of Geneva, 1Email: tewfiq.elmaliki@hesge.ch

Jean-Marc Seigneur2,    University of Geneva, 2Email: jean-marc.seigneur@reputaction.com

1 Introduction

Anytime, anywhere mobile computing is becoming easier, more attractive and even cost-effective: the mobile devices carried by the roaming users offer more and more computing power and functionalities including sensing and providing location-awareness [1]. A lot of computing devices are also deployed in the environments where the users evolve; for example, intelligent home appliances or RFID-enabled fabrics. In this ambient intelligent world, the choices of identity mechanisms will have a large ...

Get Computer and Information Security Handbook, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.