Skip to main content

DigIdeRP Framework

  • Chapter
  • First Online:
  • 615 Accesses

Part of the book series: Springer Theses ((Springer Theses))

Abstract

We cover in this chapter three main areas. The first area deals with the foundations and basic concepts of service orientation and service-oriented architecture. The second one deals with a high level and detailed descriptions of DigIdeRP framework. In the last area, we present and describe each block that composes SoaML-based DigIdeRP framework.

The proper study of mankind is the science of design.

Herbert Simon (American scientist, 1916–2001)

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD   109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    http://freenetproject.org

  2. 2.

    https://kantarainitiative.org/

References

  1. H. Noonan (ed.), Identity. Stanford Encyclopedia of Philosophy (2009)

    Google Scholar 

  2. International Telecommunication Union (2006), Digital life. ITU Internet Report Available: http://www.itu.int/osg/spu/publications/digitalife/docs/digital-life-web.pdf. Accessed 21 May 2010

  3. G. Karjoth et al, Privacy-enabled services for enterprises, in 13th International Workshop on Database and Expert Systems Applications (DEXA’02), 2002, p. 483

    Google Scholar 

  4. T. Erl, Service-Oriented Architecture: Concepts, Technology, and Design. (Prentice Hall, New Jersey, 2005)

    Google Scholar 

  5. M. Benantar, Access Control Systems: Security, Identity Management and Trust Models. (Springer, Berlin, 2006)

    Google Scholar 

  6. Center for Democracy and Technology (2007), Privacy principles for identity in the digital age (Draft for comment—version 1.4). Available: http://www.cdt.org/files/pdfs/20071201_IDPrivacyPrinciples.pdf. Accessed 28 May 2010

  7. Organization for Economic Co-operation and Development (OECD) (2008), At crossroads: personhood and Digital Identity in the Information Society. The working paper series of the OECD directorate for science, technology and industry. Available: http://www.oecd.org/LongAbstract/0,3425,en_2649_34223_40204774_119684_1_1_1,00.html. Accessed 21 May 2010

  8. L. Lessig, Code and Other Laws of Cyberspace. (Basic Books, New York, 2000)

    Google Scholar 

  9. A. Cavoukian (2009), Privacy by Design. Available: http://www.privacybydesign.ca/pbdbook/PrivacybyDesignBook.pdf. Accessed 7 June 2010

  10. S. Vanamali, Identity management framework. Inf. Syst. Control J. 4, 49–52 (2004)

    Google Scholar 

  11. C. Daeseon et al, An information security model for the next generation application service, in Proceedings of the 2nd International Workshop for Asia Public Key Infrastructure, Taipei, Taiwan, 2002

    Google Scholar 

  12. R. Sandhu, Engineering authority and trust in cyberspace: the OM-AM and RABC way, in Proceedings of the 5th ACM Workshop on RBAC, 2000, pp. 111–119

    Google Scholar 

  13. J. Sherwood, Opening up the enterprise. Comput. Secur. J. 19, 710–719 (2000)

    Article  Google Scholar 

  14. OMG (2009), Service oriented architecture modeling language (SoaML)—specification for the UML profile and metamodel for services (UPMS). Available: http://www.omg.org/spec/SoaML/1.0/Beta2/PDF/. Accessed 20 June 2010

  15. D. Krishnan (2009), OMG Releases Draft of SoaML. Available: http://www.infoq.com/news/2009/01/omg-releases-soaml. Accessed 22 June 2010

  16. ITU Focus Group on Identity Management (FG IdM), Report on identity management use cases and gap analysis, 2007

    Google Scholar 

  17. A. Jøsang, S. Pope, User-centric identity management, in Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, 2005, pp. 1–6

    Google Scholar 

  18. T. Varvarigou, V. Andronikou, Identity management in GRID computing and service oriented architectures: research and practice. Paper presented at the Second Multidisciplinary Workshop on Identity in the Information Society (IDIS 2009), London, UK, 2010

    Google Scholar 

  19. PriceWaterhouseCoopers Thought Leadership Institute (2010), From the white board to the bottom line: the case for pursuing process maturity through business process management. Available: http://download.pwc.com/ie/pubs/from_the_white_board_to_the_bottom_line.pdf. Accessed 18 Mar 2011

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ghazi Ben Ayed .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ben Ayed, G. (2014). DigIdeRP Framework. In: Architecting User-Centric Privacy-as-a-Set-of-Services. Springer Theses. Springer, Cham. https://doi.org/10.1007/978-3-319-08231-8_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-08231-8_5

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-08230-1

  • Online ISBN: 978-3-319-08231-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics