Publication:
Blended Identity: Pervasive IdM for Continuous Authentication

Research Projects
Organizational Units
Journal Issue
Abstract
A proper identity management approach is necessary for pervasive computing to be invisible to users. Federated identity management is key to achieving efficient identity blending and natural integration in the physical and online layers where users, devices, and services are present.
Description
Keywords
Authentication, Protocols, Pervasive computing, Computer architecture, Risk management, Identity management
Bibliographic citation
IEEE Security & Privacy Magazine, vol. 13(3), May/June, pp. 32-39. DOI: 10.1109/MSP.2015.62