<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Identity Metasystem in Location Based Persistent Authentication</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Hasan Ibne Akram</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Christian Damsgaard Jensen</string-name>
          <email>christian.jensen@imm.dtu.dk</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mario Ho mann</string-name>
          <email>manng@sit.fraunhofer.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Fraunhofer Institute for Secure Information Technology Munich</institution>
          ,
          <country country="DE">Germany</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Technical University of Denmark Kgs. Lyngby</institution>
          ,
          <country country="DK">Denmark</country>
        </aff>
      </contrib-group>
      <fpage>31</fpage>
      <lpage>42</lpage>
      <abstract>
        <p>Persistent authentication in smart environments (PAISE) is a new e ective approach that has changed the device-centric paradigm in traditional token based authentication systems to a much more usercentric one. Instead of carrying a security token, such as an RFID tag, all the time the location of a previously authenticated user is simply persistently tracked by sensors in the smart environment, such as cameras. For closed scenarios, recent publications have already shown various advantages, such as consistent user experience across contexts and a decreased probability of impersonation. In order to address even more complex and privacy-enhanced scenarios, we propose to enhance PAISE with Identity Management (IdM). Taking advantage of IdM, users can easily choose among di erent virtual identities and, at the same time, we can now support open and cross-context application scenarios. This paper addresses the balance between the security requirements of service providers in smart environments and the privacy concerns of users. Therefore, this paper discusses rst security and privacy implications in PAISE and evaluates then the adaptability and interoperability of existing identity management systems for persistent authentication in changing and open scenarios. As our main result and in order to ensure interoperability an Identity Metasystem on top of the PAISE architecture will be described in detail.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Authentication in context aware smart environments is typically device-centric
and based on for example RFID tokens, Smartcards or - more advanced - cell or
smart phones. Users have to carry these authentication tokens all the time and
present them to technical or human safeguards. This makes it relatively easy,
however, to impersonate authenticated users by cloning, borrowing or stealing
their authentication token. Therefore recent publications [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] proposed a new
user-centric paradigm based on user tracking called PAISE - Persistent
Authentication in Smart Environments. That means that once you have been
authenticated at a particular security gate you will be continuously tracked in a smart
environment, e.g. by sensors or cameras, until you leave the area covered. In this
paper we will deal with the implications of this physical single-sign-on experience
balancing security requirements and privacy concerns and propose appropriate
enhancements to the existing PAISE architecture.
1.1
      </p>
    </sec>
    <sec id="sec-2">
      <title>Persistent Authentication</title>
      <p>
        Persistent Authentication [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] has been proposed as a proactive authentication
mechanism, which combines existing authentication mechanisms based on
passwords, smartcards or biometrics, with person tracking using "Time-of-Flight"
(TOF) cameras. Users are authenticated when they enter the smart environment
and the TOF cameras are subsequently used to track the user as he moves around
in the smart environment, which makes the event of authentication "stick" to the
user, thus making it persistent. This means that the persistent authentication
mechanism can proactively authenticate the user to a service in the smart
environment whenever the user requests access to that service. Ideally, this means
that users would only have to authenticate when they arrive at work in the
morning and the system will be able to authenticate them to physical access control
services, computing services and other services throughout the day. Similar ideas
have been explored in other projects, but these have all required users to carry a
small authentication token with them at all times and it is e ectively this token
that is authenticated, so we refer to such mechanisms as device-centric
authentication. The problem with device-centric authentication is that users must always
remember to carry the token with them and authentication tokens can be
borrowed, lost or stolen. We therefore believe that tracking the user, rather than
the token, is a more convenient and secure way to authenticate users in
emerging smart environments. However, constant tracking of users will be seen as a
serious violation of privacy by many people, so it is important to develop a
system that limits the problem of privacy violation in location-based persistent
authentication.
1.2
      </p>
    </sec>
    <sec id="sec-3">
      <title>Identity Management</title>
      <p>Identity Management (IdM) refers to the maintenance of the complete lifecycle
of digital virtual identities. Virtual identities are characterized by a collection of
personalized information containing for example names, address(es), eMail and
telephone, account data, bank or credit card information, as well as preferences,
pro les, histories of service usages and contexts. We can say that virtual
identities re ect at least parts of one's real identity and basically consist of an open
and dynamic set of attributes for a speci c period of time. In smart
environments IdM gains even more attention and importance. Smart environments are
enabled by IT systems working in the background gathering and reasoning on
context information including analyzing and predicting user behavior. On the
one hand these systems will provide useful and convenient personalized services
in the future - persistent authentication based on TOF cameras is such a
service; on the other hand the information collected might - in principle - violate
the users' privacy if you do not establish reasonable mechanisms to tackle these
concerns by managing personalized information in a secure way. Identity
Management Systems enable both users as well as service providers to manage virtual
identities in a secure and e ective way. Users are able to maintain for example
a set of virtual identities depending on account and authorization information
for speci c services and contexts. Service providers are at the same time able to
distinguish di erent users acting in di erent contexts attaching di erent
authorization and access rights in order to assure accountability and the establishment
of appropriate security policies. Therefore, we introduce in this paper IdM
concepts, including an Identity Metasystem, to PAISE in order to address raising
privacy concerns in smart environments equipped with TOF cameras and to
balance these concerns with security requirements from service providers. Users
who work in such environments IdM helps to choose the right virtual identity
with the minimum set of necessary attributes. Service providers who run smart
environments relying on persistent authentication IdM helps to attach the right
privileges and access rights to users. The proposed Identity Metasystem will
nally ensure that di erent IdM Systems will be able to interoperate across
di erent contexts and scenarios.
1.3</p>
    </sec>
    <sec id="sec-4">
      <title>Paper Structure</title>
      <p>The paper is organized in the following way: Section 2 presents a short overview
of the PAISE model and identi es the privacy concerns that must be addressed
if persistent authentication is to be widely deployed. Section 3 introduces the
interoperability concept of Identity Metasystems followed by Section 4 where
according to the privacy concerns the state of the art in identity management
technologies will be analyzed. Section 5 proposes an architecture that integrates
Identity Metasystems with the existing persistent authentication architecture
and Section 6 presents an evaluation and discussion of the proposed architecture.
Finally, we present our conclusions in Section 7.
2
2.1</p>
      <sec id="sec-4-1">
        <title>Location Tracking</title>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>The PAISE Model</title>
      <p>The PAISE model de nes four major components in a persistent authentication
system: an authentication system, which is able to authenticate principals; a
smart environment, which delivers the sensor data needed for tracking; an
access control mechanism, which acts on the result of persistent authentication
and the core component of PAISE, which combines the information from the
authentication system and the smart environment, tracks authenticated principals
in the smart environment and forward the necessary data to the access control
mechanism. These components are shown in Figure 1.</p>
      <p>In addition to these four components, PAISE also de nes authentication
zones and authorization zones in the smart environment. An authentication zone
de nes the area in front of the authentication mechanism which is large enough
to hold a single principal.</p>
      <p>The smart environment delivers a constant stream of sensor data to the
core component, but tracking is only initiated when a principal has entered the
authentication zone and successfully authenticated himself. The authentication
zone must be small enough to ensure that the authentication event can be reliably
linked to the principal. A typical authentication zone, in a smart environment,
would be an area of 0.5m x 0.5m in front of a swipe-card terminal. An
authorization zone de nes the area in which the access control policy of a location based
service must be enforced. When new principals enter an authorization zone the
persistent authentication is forwarded to the access control mechanism of the
location based service provider, which is then able to determine whether access
should be granted. In the case of access through a door, in a smart environment,
the authorization zone must be small enough to ensure that most principals are
able to reach and open the door while it is unlocked, but also large enough to
ensure that nobody outside the authorization zone is able to pass through the door
while it is open. This allows the system to enforce the constraint that the door
can only be unlocked if there are no unauthenticated or unauthorized principals
inside the authorization zone, thus preventing tailgating.
2.2</p>
    </sec>
    <sec id="sec-6">
      <title>Privacy Concerns in Location Tracking Systems in Smart</title>
    </sec>
    <sec id="sec-7">
      <title>Environments</title>
      <p>
        Privacy issue is by no means a new concern in Ubiquitous Computing or smart
environments. The foreseer of ubiquitous computing Mark Weiser had already
pointed out the issue of privacy in 1991 [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. Langheinrich showed how potentially
privacy can be endangered in such environments without even the consent of the
user [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Similarly, location based tracking systems (LTS) has been shown to be
inherently privacy dissenting. Therefore, the privacy issue in smart environments
using LTS must be taken into consideration and requirements for privacy
compliance has to be de ned. Previous studies show that privacy risk is apparent
on LTSs (e.g. RFID, GPS etc.) since LTSs collect information silently, without
the consent or even awareness of the user [4{6]. Information can be collected
about an individual and can be aggregated to gure out near-perfect knowledge
of the individual's whereabouts and activities. If we refer back to the de nition
of privacy from Louis Brandeis, 1890 (Harvard Law Review): "The right to be
let alone.", LTSs violate privacy of an individual. Although PAISE is inherently
designed to be relatively more privacy compliant than other camera based
tracking as it uses a non recognizable image (blob) of the object, still it su ers from
some traditional privacy issues that any location based tracking system has. If
we get back to the de nition of Brandeis and try to apply it in PAISE we see
that PAISE is even less compliant to privacy because: in traditional device based
tracking system, the user is able to switch o the device when he wants to and
thus becomes invisible to the system. On the other hand, it is not possible to
switch o tracking in PAISE that easily, so the user's right to be left alone is
not easily accomplished.
2.3
      </p>
    </sec>
    <sec id="sec-8">
      <title>Privacy Principles in Smart Environments</title>
      <p>
        Requirements and principles of Identity Management have been analyzed and
derived in pervasive computing ever since the very beginning of pervasive
computing. Obviously, these related works have some commonalities and disparities
among themselves. Our objective in this section is to narrow down the
privacy principles of Smart Environments suitable to LTS in such environments.
Langheinrich [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] identi ed six principles and guidelines for privacy aware
ubiquitous system. It is important to mention that these principles and guidelines
do not ensure total privacy. The goals of these privacy guidelines are to get as
close as possible to Brandeis' de nition of privacy. We have picked four of the
privacy principles as they are mostly relevant for persistent authentication using
LTS. These four principles are outlined below:
{ Notice: "Transparency" or "Openness" is the most fundamental principle
of any data collection system. When the location data about the user is
collected in PAISE but not saved, the user should be noti ed about that.
{ Choice and Consent: A mere notice to the user about its location data
being tracked is not enough anymore as EU Directive 3 re ned and extended
the well-known fair information practices. There has to be explicit consent
of the user about the location tracking.
{ Anonymity and Pseudonymity: Since in a LTS it is very di cult to
have an explicit consent of the user at any given time, a certain degree of
anonymity and Pseudonymity is also necessary.
{ Proximity and Locality: This principle tells us that information should be
locally preserved. In terms of LTS we can clarify the principle in a way that if
information is not disseminated out of a certain locality or area, the likability
of tracking will be harder and thus it will be more privacy compliant.
3 European Commission. Directive 95/46/ec of the European parliament and of the
council of 24 October 1995 on the protection of individuals with regard to the
processing of personal data and on the free movement of such data, November 1995.
      </p>
      <sec id="sec-8-1">
        <title>Identity Metasystem</title>
        <p>
          Identity Metasystem is a notion of abstracting the identity layer from the rest
of the system with the intention of gaining interoperability, privacy and
usability [7{10]. Identity Metasystem can well be explained using the following
analogies: before 1950 programmers had to write assembly codes to ful ll their
programming needs. Code pieces written in assembly language required extreme
intellectual e orts and more problematically it lacked totally the feature of
being portable from machine to machine. Invention of compilers in 1950s and early
1960s brought along an abstraction layer where a generic form of code piece
could reside and could be translated back to machine speci c assembly code
according to need; thus bringing portability to code pieces breaking the machine
speci c silos. Similarly in the 1970s and early 1980s, before the general adoption
of IP, distributed applications were bound to possess network speci c knowledge
e.g. Ethernet, Token Ring or Frame Relay. But IP was again being an
abstraction layer acted as encapsulation of such network speci c technologies. Following
these two analogies we can think of an Identity Metasystem that acts as such
mediator of existing Identity Management systems allowing interoperability and
portability of identity [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ].
        </p>
        <p>
          Identity Metasystem is a complex system that integrates the existing IdM
systems to provide seamless interoperability and portability. Figure 2 illustrates
how IdPs with speci c Security Token Services (e.g. Kerberos, X.509 etc.) is
federating identity to RPs who accept other types of Security Tokens (e.g. SAML,
OpenID). WS-SecurityPolicy is shown to be the policy negotiation mechanism,
and WS-trust [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] and WS-MetadataExchange [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ] as the abstraction layer.
        </p>
        <p>
          Having introduced the basic concept of Identity Metasystem in this section,
we now address an obvious question that would strike the reader's mind: what
is the implication of Identity Metasystem in LTS? In Section 2.3 we examined
the principles of privacy in LTS in smart environments. Our objective in this
section is to elaborate on how close to those principles we can bring PAISE by
hybridization with Identity Metasystem. First of all, an Identity Metasystem
helps users to stay in control of their identity interactions by allowing them to
select context relevant digital persona they would like to reveal in a particular
instance. These digital personas contain minimum personal information required
for a transaction. In case of PAISE the system will only know whether the
user is authorized to access a certain resources or not. Secondly, it empowers
users to make informed and reasonable decision about disclosing their identity
in such environments [
          <xref ref-type="bibr" rid="ref13 ref14">13, 14</xref>
          ]. Thus, Identity Metasystem can potentially improve
privacy in LTS. However, as we have mentioned in Section 2.3, absolute privacy
protection is not achievable by the privacy principles from Langheinrich, in a
similar way Identity Metasystem will also not provide total privacy protection,
rather more privacy awareness.
4
        </p>
      </sec>
      <sec id="sec-8-2">
        <title>Identity Management Technologies</title>
        <p>We have illustrated a conceptual view on Identity Metasystem and its
implication in LTS. Before we move into our architectural description of Identity
Metasystem in PAISE, in this section we provide an overview of the
predominant IdM technologies and compare their compliance with the privacy principles
(cf. Section 2.3).
4.1</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>OpenID</title>
      <p>OpenID 1.0 was originally developed in 2005 by Brad Fitzpatrick, Chief
Architect of Six Apart, Ltd. OpenID, a protocol for light weighted identity, is
adopted by a wide range of websites, especially which have heavy user-generated
contents. OpenID Authentication 2.0 [15{17] is a fully backward-compatible
open community-driven platform that permits and motivates federated
identity. OpenID Authentication 2.0 speci cation which is a data transfer protocol
to support both push and pull use cases. Besides, the community is coming up
with extensions to support the exchange of rich pro le data and user-to-user
messaging. There are three key features of OpenID: Single Sing On,
decentralized and light weight identity. According to an article published in German
online computer magazine "Heise Online 4" on 18th January 2008 there were
already 370 million OpenIDs existing globally. However, the real number of
active OpenID users is still unknown, because big companies like Yahoo and Aol
o ered an OpenID to all their users, which explains the high number of existing
OpenIDs. By Design, the OpenID protocol su ers from serious privacy issues.
OpenID allows URL to Identify a subject or a user and the URL that is used to
identify the Subject is recyclable. Since OpenID permits URL based identi
cation, it brings the issue of privacy. The privacy of the user using an URL as his
4 http://www.heise.de/security/Yahoo-will-das-Passwort-Chaos-beenden{
/news/meldung/102001, last viewed on Monday, December 01, 2008
OpenID will be compromised somehow the possession of that URL lost. This is
how the principles of users' choice, consent, proximity and locality is violated in
case of URL recycling.
4.2</p>
    </sec>
    <sec id="sec-10">
      <title>Windows CardSpace</title>
      <p>
        Windows CardSpace is a visual metaphor for identity selector for the end-user.
Windows CardSpace provides controlling power to the end-users on the fact
that which information (about the end-users) should reach to the Relying Party
(RP) and which should not. Windows CardSpace is a production of Microsoft
shipped with Windows Vista (or as an add-on in Windows XP); it is not meant
to replace the other standards handling digital identity rather to utilize and
extend them [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Windows CardSpace is token agnostic. Microsoft codename
"Geneva" is coming up with the next version of Windows CardSpace. "Geneva"
is a claim based access platform, which includes three components: "Geneva"
Server, Windows CardSpace "Geneva" and "Geneva" Framework [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ]. Windows
CardSpace has major privacy aws: rstly it relies on the users' judgments on
the trustworthiness of RPs. A CardSpace user is given the freedom to choose
one of the options of high-assurance certi cate belonging to the RP, ordinary
certi cate belonging to the RP or RP with no certi cates [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ]. In terms of the
rst privacy principle (choice and consent) this certainly gives a lot of power
to the user. At the same time the option of allowing RP with no certi cates
weakens the compliance with the fourth principle (proximity and locality) as
information may leak out to an unwanted domain. The second vulnerability is that
Windows CardSpace rely on a single layer of authentication. The user has to be
authenticated to the IdP using traditional authentication mechanism. If a
working session is somehow hijacked or password is cracked, the security of the whole
system is compromised. This has been practically showed by two IT-Security
students at Horst Grtz Institute for IT Security (HGI), Bochum, Germany where
they manipulated the DNS server to implement dynamic pharming attack 5.
4.3
      </p>
    </sec>
    <sec id="sec-11">
      <title>Higgins Trust Framework</title>
      <p>
        Higgins is a software infrastructure that provides a consistent user experience
across multiple digital identity protocols, e.g. WS-Trust, OpenID, SAML, XDI,
LDAP etc. The main objectives of the Higgins project are the management of
multiple contexts, interoperability, and the de nition of common interfaces for
an identity system. Various technologies including LDAP, SAML, WS-*, OpenID
etc. can be plugged into the Higgins framework. The rst version, Higgins 1.0
was released in February 2008. The next version, Higgins 1.1 was supposed to be
released by June 2009. There are also ideas and concepts in discussion beyond
Higgins 1.1 [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
5 On the Insecurity of Microsoft's Identity Metasystem CardSpace, Press release,
Bochum, Germany, May 27, 2008,
http://demo.nds.rub.de/cardspace/PR-HGI-TR2008-003-EN.pdf
      </p>
      <p>Since Higgins supports various IdM protocols and technologies it inherently
takes over the aws and vulnerabilities of those technologies and protocols. It
also does not fourth principle (proximity and locality). However, the combined
approach to provide an umbrella framework for IdM allows Higgins users to
choose the best combination of technologies suited to their requirements.
Moreover, Higgins architecture is most compliant to other three privacy principles
(Section 2.3) among the state of the art technologies that have been considered
in this evaluation. Therefore, in our architecture we have taken some of the
Higgins architectural approach and integrated to our need. In the next section the
evaluation result is summarized.
4.4</p>
    </sec>
    <sec id="sec-12">
      <title>Evaluation of the State of the Art</title>
      <p>Our proposed architecture is based on Identity Federation between three entities:
the user, the IdP and the RP. The user requests for access to a certain resource
from a RP in the smart environment and gains the access upon required
credential is federated by an IdP. Note that same entities can play the role of IdP
or RP depending on the context. By means of Identity Federation the proposed
architecture will bring more privacy features on top of the PAISE authentication
mechanism.</p>
      <p>The communication protocol shown in Figure 4 works the following way:
1. The user requests for accessing certain resources.
2. The user is redirected to an IdP by the RP.</p>
      <p>This architecture allows decoupling of user identity from IdP and RP, i.e.,
users can use di erent identities and possibly di erent IdPs towards di erent
RPs in the environment. This is how it captures the essence of being ambient
in smart environment and switch identity to plug into di erent contexts. It
leverages location tracking feature of PASIE and identity federation features of
Identity Metasystem to enable multi-party federation in an ambient manner.
6</p>
      <sec id="sec-12-1">
        <title>Discussion</title>
        <p>In this section we brie y discuss how the proposed architecture accomplishes the
privacy principles described in Section 2.3.</p>
        <p>{ Notice: First of all, the user is able to choose an InformationCard as a
visual metaphor of his digital identity, which allows him a human readable
mechanism to understand exactly what information about him is fed to the
system, i.e., the data collection system is more "open" and "transparent" to
the user. This exactly re ects the rst privacy principle "notice" mentioned
in Section 2.3.
{ Choice and Consent: Secondly, when the user is sending a request for a
resource, he is redirected to his IdP and the IdP requests for his credential. In
this case the user can choose a suitable digital persona for the given context.
This brings the privacy principle "choice and consent" to be applicable in
PAISE.
{ Anonymity and Pseudonymity: Moreover, when the user is federated
by an external identity provider to access resources to a smart environment,
the system only knows if the user has the right credential to access a certain
resources. Obviously, there has to be a prede ned trust mechanism between
the external IdP and domain of the smart environment the user is accessing.
This allows the user a certain degree of anonymity within the area where
he is tracked by the PAISE system, i.e., he is not identi ed as an individual
entity rather as an entity belonging to a group.
{ Proximity and Locality: Finally, his tracking data does not go beyond the
locality of his foreign domain, i.e., his IdP who has his actual identi cation
does not gain access to his movement data. Thus it allows the fourth privacy
principle "`proximity and locality" to be applicable up to a certain degree.
7</p>
      </sec>
      <sec id="sec-12-2">
        <title>Conclusion &amp; Outlook</title>
        <p>To summarize the implication of the "Identity Metasystem" as an add-on to the
PAISE model it is important to highlight some bene ts of Federated Identity
and InformationCard. First of all federated identity makes data collection
fragmented, thus leads to less unlinkability without losing the possibility of
traceability. Accountability vs. anonymity has been a classic debate between proponents
of privacy and security. Federated Identity somehow meets the balance between
these two. Another signi cant addition is an InformationCard. InformationCard
provides a clear and usable representation of digital identity. It allows context
aware identity selection, empowerment of the user and usability. Although the
user is not able to switch o his tracking, by means of identity selector he can
choose InformationCard selecting di erent identities and contexts. This is how
PAISE is one step closer to the old de nition of privacy given by Brandeis, i.e.,
the right to be leave one identity mask and select a new one has been
accomplished.</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Hansen</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kirshmeyer</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jensen</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Persistent authentication in smart environments</article-title>
          .
          <source>In Proceedings of the 2nd International Workshop on Combining Context with Trust</source>
          , Security, and
          <string-name>
            <surname>Privacy (CAT08) (June</surname>
          </string-name>
          ,
          <year>2008</year>
          )
          <volume>31</volume>
          {
          <fpage>44</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Weiser</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>The computer for the 21st century</article-title>
          .
          <source>SIGMOBILE Mob. Comput. Commun. Rev</source>
          .
          <volume>3</volume>
          (
          <issue>3</issue>
          ) (
          <year>1999</year>
          )
          <volume>3</volume>
          {
          <fpage>11</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Langheinrich</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Privacy by design - principles of privacy-aware ubiquitous systems</article-title>
          .
          <source>In: UbiComp '01: Proceedings of the 3rd international conference on Ubiquitous Computing</source>
          , London, UK, Springer-Verlag (
          <year>2001</year>
          )
          <volume>273</volume>
          {
          <fpage>291</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Lockton</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rosenberg</surname>
            ,
            <given-names>R.S.:</given-names>
          </string-name>
          <article-title>R d: The next serious threat to privacy</article-title>
          .
          <source>Ethics and Inf. Technol</source>
          .
          <volume>7</volume>
          (
          <issue>4</issue>
          ) (
          <year>2005</year>
          )
          <volume>221</volume>
          {
          <fpage>231</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Michael</surname>
            ,
            <given-names>M.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fusco</surname>
            ,
            <given-names>S.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michael</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>A research note on ethics in the emerging age of uberveillance</article-title>
          .
          <source>Comput. Commun</source>
          .
          <volume>31</volume>
          (
          <issue>6</issue>
          ) (
          <year>2008</year>
          )
          <volume>1192</volume>
          {
          <fpage>1199</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Perusco</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Michael</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Control, trust, privacy, and security: evaluating locationbased services</article-title>
          .
          <source>Technology and Society Magazine</source>
          , IEEE
          <volume>26</volume>
          (
          <issue>1</issue>
          ) (
          <year>Spring 2007</year>
          )
          <volume>4</volume>
          {
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cameron</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>The laws of identity</article-title>
          . Microsoft Corporation, http://www.identityblog.com/stories/2005/05/13/TheLawsOfIdentity.pdf (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Akram</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Ho mann, M.:
          <article-title>Supports for identity management in ambient environments - the hydra approach</article-title>
          .
          <source>Systems and Networks Communications</source>
          ,
          <year>2008</year>
          . ICSNC '
          <volume>08</volume>
          . 3rd International Conference on (Oct.
          <year>2008</year>
          )
          <volume>371</volume>
          {
          <fpage>377</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>McLaughlin</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>What microsoft's identity metasystem means to developers</article-title>
          . Software, IEEE
          <volume>23</volume>
          (
          <issue>1</issue>
          )
          <string-name>
            <given-names>(</given-names>
            <surname>Jan.-Feb</surname>
          </string-name>
          .
          <year>2006</year>
          )
          <volume>108</volume>
          {
          <fpage>111</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Cameron</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jones</surname>
            ,
            <given-names>M.B.</given-names>
          </string-name>
          :
          <article-title>Design rationale behind the identity metasystem architecture (</article-title>
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Lawrenc</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , et. al.:
          <article-title>Ws-trust 1.3</article-title>
          . OASIS Standard, http://docs.oasis-open.org/wssx/ws-trust/200512/ws-trust-
          <volume>1</volume>
          .3-os.
          <source>html (19 March</source>
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Ballinger</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          , et. al:
          <article-title>Web services metadata exchange, version 1.1</article-title>
          . http://download.boulder.ibm.com/ibmdl/pub/software/dw/specs/wsmex/metadataexchange.pdf (
          <year>August 2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Akram</surname>
            ,
            <given-names>H.I.</given-names>
          </string-name>
          , Ho mann, M.:
          <article-title>User-centric identity management in ambient environments</article-title>
          .
          <source>International Journal on Advances in Intelligent Systems</source>
          vol
          <volume>2</volume>
          , no 1
          <issue>(year</issue>
          <year>2009</year>
          )
          <volume>254</volume>
          {
          <fpage>267</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Akram</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Ho mann, M.:
          <article-title>Laws of identity in ambient environments: The hydra approach</article-title>
          .
          <source>In: UBICOMM '08: Proceedings of the 2008 The Second International Conference on Mobile Ubiquitous Computing, Systems, Services and Technologies</source>
          , Washington, DC, USA, IEEE Computer Society (
          <year>2008</year>
          )
          <volume>367</volume>
          {
          <fpage>373</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Miller</surname>
          </string-name>
          ,
          <source>J.: Yadis 1</source>
          .0. http://yadis.org/papers/yadisv1.0.
          <string-name>
            <surname>pdf</surname>
          </string-name>
          (
          <year>March 2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Recordon</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Reed</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Openid 2.0: a platform for user-centric identity management</article-title>
          .
          <source>In: DIM '06: Proceedings of the second ACM workshop on Digital identity management</source>
          , New York, NY, USA, ACM (
          <year>2006</year>
          )
          <volume>11</volume>
          {
          <fpage>16</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Recordon</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fitzpatrick</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Openid authentication 1.1</article-title>
          . http://openid.net/specs/ (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Mercuri</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          : Beginning Windows CardSpace: From Novice to Professional. Apress, Berkely, CA, USA (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Brown</surname>
            <given-names>K</given-names>
          </string-name>
          , Mani,
          <string-name>
            <surname>S.:</surname>
          </string-name>
          <article-title>Microsoft code name "geneva" framework whitepaper for developers</article-title>
          .
          <source>Microsoft Corporation</source>
          , http://download.microsoft.com/download/7/d/0/7d0b5166-6a8a
          <string-name>
            <surname>-</surname>
          </string-name>
          418a-addd95ee9b046994/GenevaFrameworkWhitepaperForDevelopers.pdf (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Alrodhan</surname>
          </string-name>
          , W.A., Mitchell, C.J.:
          <article-title>Addressing privacy issues in cardspace</article-title>
          .
          <source>In: IAS '07: Proceedings of the Third International Symposium on Information Assurance and Security</source>
          , Washington, DC, USA, IEEE Computer Society (
          <year>2007</year>
          )
          <volume>285</volume>
          {
          <fpage>291</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Ruddy</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Trevithick</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nadalin</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olds</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Higgins trust framework</article-title>
          .
          <source>Digital ID World</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>