![](common/images/x.gif) |
![](common/images/x.gif) |
![](common/images/x.gif) |
Award Abstract #0428554
The Design and Use of Digital Identities
![](common/images/greenline.jpg)
NSF Org: |
IIS
Division of Information & Intelligent Systems
|
![divider line](common/images/x.gif) |
![divider line](common/images/x.gif) |
Initial Amendment Date: |
September 10, 2004 |
![divider line](common/images/x.gif) |
Latest Amendment Date: |
April 20, 2005 |
![divider line](common/images/x.gif) |
Award Number: |
0428554 |
![divider line](common/images/x.gif) |
Award Instrument: |
Standard Grant |
![divider line](common/images/x.gif) |
Program Manager: |
Sylvia J. Spengler
IIS Division of Information & Intelligent Systems
CSE Directorate for Computer & Information Science & Engineering
|
![divider line](common/images/x.gif) |
Start Date: |
September 15, 2004 |
![divider line](common/images/x.gif) |
Expires: |
August 31, 2008 (Estimated) |
![divider line](common/images/x.gif) |
Awarded Amount to Date: |
$900000 |
![divider line](common/images/x.gif) |
Investigator(s): |
Elisa Bertino bertino@cs.purdue.edu (Principal Investigator)
Eugene Spafford (Co-Principal Investigator) Howard Sypher (Co-Principal Investigator)
Mikhail Atallah (Former Co-Principal Investigator)
|
![divider line](common/images/x.gif) |
Sponsor: |
Purdue University
302 Wood Street
West Lafayette, IN 47907 765/494-4600
|
![divider line](common/images/x.gif) |
NSF Program(s): |
ITR FOR NATIONAL PRIORITIES
|
![divider line](common/images/x.gif) |
Field Application(s): |
0104000 Information Systems
|
![divider line](common/images/x.gif) |
Program Reference Code(s): |
HPCC,9215
|
![divider line](common/images/x.gif) |
Program Element Code(s): |
7314
|
ABSTRACT
![](common/images/bluefade.jpg)
Digital identity management (DIM) has emerged as a critical foundation for supporting successful interactions in today's globally interconnected society. It is crucial not only for the conduct of business and government but also for a large and growing body of electronic or online social interactions. In its broadest sense, identity management encompasses definitions and life-cycle management for digital identities and profiles, and the environments for exchanging and validating such information, including anonymous and pseudonymous representations. The project addresses a wide variety of digital identity needs by developing required Flexible, Multiple and Dependable Digital Identity (FMDDI) technology, based on a sound underlying set of definitions and principles. The FMDDI technology developed in the project will support multiple forms of identity, including nyms, partial identities, and a variety of user properties, credentials, and roles. Relevant research trusts in the project include: identity schemes and representation formats; use of ontology and issues related to identity interoperability; anonymity, dependability, accountability, and forensic-friendly identification schemes; psychological and social aspects related to the use of digital identities.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
![](common/images/bluefade.jpg)
(Showing: 1 - 8 of 8).
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino..
"Establishing and protecting digital identity in federation systems.,"
Journal of Computer Security.,
v.14,
2006,
p. 269.
A. Bhargav-Spantzel, A. C. Squicciarini, E. Bertino..
"Trust Negotiation in Identity Management.,"
IEEE Security&Privacy.,
v.5,
2007,
p. 55.
A. C. Squicciarini, E. Bertino, E. Ferrari, I. Ray..
"Achieving Privacy in Trust Negotiations with an Ontology-Based Approach.,"
IEEE Transaction on Dependable and Secure Computing.,
v.3,
2006,
p. 13.
M.L. Damiani, E. Bertino, B. Catania, P.Perlasca..
"GEO-RBAC: a Spatially Aware RBAC.,"
ACM Transactions on Information and System Security.,
v.10,
2007,
p. 1.
M.Shehab, E. Bertino, A. Ghafoor..
"Secure Collaboration in Mediator-free Environments.,"
Proceedings of ACM Conference on Computer and Communication Security.,
2005,
p. 58.
R. Bhatti, B. Shafiq, E. Bertino, A. Ghafoor, J. Joshi..
"X-gtrbac admin: A decentralized administration model for enterprise-wide access control.,"
ACM Transactions on Information and System Security.,
v.8,
2005,
p. 388.
Yongping Tang and Thomas E Daniels..
"On the Economic Placement of Monitors in Router Level Network Topologies.,"
Proceedings of the 1st Workshop on
the Economics of Securing the Information Infrastructure, Washington DC.,
2006,
p. 55.
Yongping Tang, Yema Livepool and Thomas E Daniels..
"Monitor placement for stepping stone analysis.,"
Proceedings of the 25th IEEE International Performance Computing and Communications Conference (Workshop on Information Assurance WIA-2006), Phoenix, AZ,
2006,
p. 27.
(Showing: 1 - 8 of 8).
Please report errors in award information by writing to: awardsearch@nsf.gov.
|
![](common/images/x.gif) |
![](common/images/x.gif) |