The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.06 - November/December (2011 vol.9)
pp: 29-35
Antonio Manuel Fernández Villamor , Universidad Politécnica de Madrid
Juan C. Yelmo , Universidad Politécnica de Madrid
ABSTRACT
Every day, new digital services with innovative features appear. As time goes by, the Internet integrates more deeply with our lives. Threats and vulnerabilities derived from the nuances of computing and the Internet are translated into real-life dangers. This is particularly critical for inexperienced users, who are easy victims of digital fraud. Improper use of digital services might lead them to access unsuitable information or incorrectly use legitimate services. Technologies enforcing online user activity control have emerged but face limitations regarding their digital-service independence. Oversee (online user supervision architecture) lets Internet services stipulate that users comply with a series of requirements or be accompanied by a qualified supervisor. Thus the supervisor can manage online user behavior.
INDEX TERMS
real-time user supervision, user guidance, remote authorization, identity management, mobile authentication, computer security, cybersecurity
CITATION
Antonio Manuel Fernández Villamor, Juan C. Yelmo, "Helping Users Deal with Digital Threats: The Online User Supervision Architecture", IEEE Security & Privacy, vol.9, no. 6, pp. 29-35, November/December 2011, doi:10.1109/MSP.2011.73
REFERENCES
1. Federal Trade Commission, "Children's Online Privacy Protection Rule,"27 Sept. 2011; http://ftc.gov/os/2011/09110915coppa.pdf .
2. E. Maler, "UMA 1.0 Core Protocol,"8 Sept. 2011; http://kantarainitiative.org/confluence/ display/umaUMA+1.0+Core+Protocol.
3. A. Bhargav-Spantzel et al., "User Centricity: A Taxonomy and Open Issues," Proc. 2nd ACM Workshop Digital Identity Management (DIM 06), ACM Press, 2006, pp. 1–10.
4. Identity Metasystem Interoperability, Version 1.0, OASIS, 2008.
5. "Quick Overview," Information Card Foundation, 2009; http://informationcard.netquick-overview .
6. A. Nanda, A Technical Reference for the Information Card Profile V1.0, tech. report, Microsoft, 2006; www.identityblog.com/wp-content/resources/ profileInfoCard-Profile-v1-TechRef.pdf .
7. "3G Security; Generic Authentication Architecture (GAA); System Description," 3rd Generation Partnership Project, Sept. 2011; www.3gpp.org/ftp/Specs/html-info33919.htm .
8. "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA)," 3rd Generation Partnership Project, Sept. 2011; www.3gpp.org/ftp/Specs/html-info33220.htm .
9. "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) Push Function," 3rd Generation Partnership Project, Sept. 2011; www.3gpp.org/ftp/specs/html-info33223.htm .
40 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool