This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Helping Users Deal with Digital Threats: The Online User Supervision Architecture
November/December 2011 (vol. 9 no. 6)
pp. 29-35
Antonio Manuel Fernández Villamor, ETSI de Telecomunicación, Universidad Politécnica de Madrid , Madrid Madrid
Antonio Manuel Fernández Villamor, Universidad Politécnica de Madrid
Juan Yelmo, Technical University of Madrid, Madrid
Juan C. Yelmo, Universidad Politécnica de Madrid
Every day, new digital services with innovative features appear. As time goes by, the Internet integrates more deeply with our lives. Threats and vulnerabilities derived from the nuances of computing and the Internet are translated into real-life dangers. This is particularly critical for inexperienced users, who are easy victims of digital fraud. Improper use of digital services might lead them to access unsuitable information or incorrectly use legitimate services. Technologies enforcing online user activity control have emerged but face limitations regarding their digital-service independence. Oversee (online user supervision architecture) lets Internet services stipulate that users comply with a series of requirements or be accompanied by a qualified supervisor. Thus the supervisor can manage online user behavior.

1. Federal Trade Commission, "Children's Online Privacy Protection Rule,"27 Sept. 2011; http://ftc.gov/os/2011/09110915coppa.pdf .
2. E. Maler, "UMA 1.0 Core Protocol,"8 Sept. 2011; http://kantarainitiative.org/confluence/ display/umaUMA+1.0+Core+Protocol.
3. A. Bhargav-Spantzel et al., "User Centricity: A Taxonomy and Open Issues," Proc. 2nd ACM Workshop Digital Identity Management (DIM 06), ACM Press, 2006, pp. 1–10.
4. Identity Metasystem Interoperability, Version 1.0, OASIS, 2008.
5. "Quick Overview," Information Card Foundation, 2009; http://informationcard.netquick-overview .
6. A. Nanda, A Technical Reference for the Information Card Profile V1.0, tech. report, Microsoft, 2006; www.identityblog.com/wp-content/resources/ profileInfoCard-Profile-v1-TechRef.pdf .
7. "3G Security; Generic Authentication Architecture (GAA); System Description," 3rd Generation Partnership Project, Sept. 2011; www.3gpp.org/ftp/Specs/html-info33919.htm .
8. "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)," 3rd Generation Partnership Project, Sept. 2011; www.3gpp.org/ftp/Specs/html-info33220.htm .
9. "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push Function," 3rd Generation Partnership Project, Sept. 2011; www.3gpp.org/ftp/specs/html-info33223.htm .
1. "Parental Control for Mobiles," O2, 2011; https:/parentalcontrol.o2.co.uk.
2. "Mac OS X v10.5, 10.6: About the Parental Controls Internet Content Filter," Apple,30 Mar. 2010; http://support.apple.com/kbht 2900.
3. "Parental Controls," Microsoft, 2011; http://windows.microsoft.com/en-US/windows7/ products/featuresparental-controls.

Index Terms:
real-time user supervision, user guidance, remote authorization, identity management, mobile authentication, computer security, cybersecurity
Citation:
Antonio Manuel Fernández Villamor, Antonio Manuel Fernández Villamor, Juan Yelmo, Juan C. Yelmo, "Helping Users Deal with Digital Threats: The Online User Supervision Architecture," IEEE Security & Privacy, vol. 9, no. 6, pp. 29-35, Nov.-Dec. 2011, doi:10.1109/MSP.2011.73
Usage of this product signifies your acceptance of the Terms of Use.