scispace - formally typeset
Search or ask a question
Author

T. El Maliki

Bio: T. El Maliki is an academic researcher. The author has contributed to research in topics: User-centered design & Ambient intelligence. The author has an hindex of 1, co-authored 1 publications receiving 94 citations.

Papers
More filters
Proceedings ArticleDOI
14 Oct 2007
TL;DR: This paper surveys how the requirements for identity management have evolved, and their associated technologies, with emphasis on the federated approaches and user-centricity.
Abstract: Computing anytime anywhere is more and more the rule. In this ambient intelligent world, the choice of identity mechanisms will have a large impact on its social, cultural, business and political aspects. Privacy is a human need and the whole of society would suffer from its demise. Moreover, people have a hectic life and cannot spend their time administering their digital identities. In this paper, we survey how the requirements for identity management have evolved, and their associated technologies, with emphasis on the federated approaches and user-centricity.

106 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper focuses on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies.
Abstract: To realize the broad vision of pervasive computing, underpinned by the “Internet of Things” (IoT), it is essential to break down application and technology-based silos and support broad connectivity and data sharing; the cloud being a natural enabler. Work in IoT tends toward the subsystem, often focusing on particular technical concerns or application domains, before offloading data to the cloud. As such, there has been little regard given to the security, privacy, and personal safety risks that arise beyond these subsystems; i.e., from the wide-scale, cross-platform openness that cloud services bring to IoT. In this paper, we focus on security considerations for IoT from the perspectives of cloud tenants, end-users, and cloud providers, in the context of wide-scale IoT proliferation, working across the range of IoT technologies (be they things or entire IoT subsystems). Our contribution is to analyze the current state of cloud-supported IoT to make explicit the security considerations that require further work.

264 citations

Journal ArticleDOI
01 Dec 2010
TL;DR: This paper proposes a solution that offers automated ways to share images based on an extended notion of content ownership and describes a simple mechanism that promotes truthfulness and that rewards users who promote co-ownership, and implements the approach in the context of Facebook.
Abstract: Social networking is one of the major technological phenomena of the Web 2.0, with hundreds of millions of subscribed users. Social networks enable a form of self-expression for users and help them to socialize and share content with other users. In spite of the fact that content sharing represents one of the prominent features of existing Social network sites, they do not provide any mechanisms for collective management of privacy settings for shared content. In this paper, using game theory, we model the problem of collective enforcement of privacy policies on shared data. In particular, we propose a solution that offers automated ways to share images based on an extended notion of content ownership. Building upon the Clarke-Tax mechanism, we describe a simple mechanism that promotes truthfulness and that rewards users who promote co-ownership. Our approach enables social network users to compose friendship based policies based on distances from an agreed upon central user selected using several social networks metrics. We integrate our design with inference techniques that free the users from the burden of manually selecting privacy preferences for each picture. To the best of our knowledge, this is the first time such a privacy protection mechanism for social networking has been proposed. We also extend our mechanism so as to support collective enforcement across multiple social network sites. In the paper, we also show a proof-of-concept application, which we implemented in the context of Facebook, one of today's most popular social networks. Through our implementation, we show the feasibility of such approach and show that it can be implemented with a minimal increase in overhead to end-users. We complete our analysis by conducting a user study to investigate users' understanding of co-ownership, usefulness and understanding of our approach. Users responded favorably to the approach, indicating a general understanding of co-ownership and the auction, and found the approach to be both useful and fair.

107 citations

Proceedings Article
01 Dec 2011
TL;DR: The issues that need to be solved in order to arrive at cloud education, including integration, ownership, security and assessment are described, and a holistic approach to cloud education is offered.
Abstract: With the advancement in technologies, the last decades have seen a sea change in the way people interact and communicate. For instance, contents, services and applications previously executed locally or on a local network are gradually finding its way to the cloud. As people and environment changes, so must education in order to be able to adapt and embrace to this paradigm shift in the educational landscape. Cloud-based education has thus arisen and has since gathered a lot of interests in the recent years. This paper thus describes the issues that need to be solved in order to arrive at cloud education, including integration, ownership, security and assessment, and offers a holistic approach to cloud education. It also put forward a new perspective in embedding mobile cloud education, an amalgamation between cloud-learning and mobile-learning domains, within a holistic intelligent campus environment.

99 citations

Proceedings ArticleDOI
01 Dec 2010
TL;DR: A survey of identity management from the perspectives of development stages and functions variety of Identity Management, which gives a rough classification of current systems to the corresponding paradigms and models.
Abstract: This paper presents a survey of identity management from the perspectives of development stages and functions variety of Identity Management The definition and core concepts of identity and identity management have been discussed deeply Identity Management models including isolated model, centralized model, and federated model are grouped by components varying and functions changing Based on the transformation of core design principles, paradigms of identity management are classified into network centric paradigm, service centric paradigm, and user centric paradigm Comparisons of these paradigms and models have been presented And we give a rough classification of current systems to the corresponding paradigms and models

77 citations

Patent
13 Nov 2008
TL;DR: In this article, a verfahren zum Lesen zumindest eines in einem ID-Token (106, 106') gespeicherten Attributs, wobei der ID-token einem Nutzer (102) zugeordnet ist, with folgenden Schritten: Authentifizierung des Nutzers gegenuber dem ID- Token, Authentifisierung eines ersten Computersystems (136') gegeneuber dem Id-Token, nach erfol
Abstract: Die Erfindung betrifft ein Verfahren zum Lesen zumindest eines in einem ID-Token (106, 106') gespeicherten Attributs, wobei der ID-Token einem Nutzer (102) zugeordnet ist, mit folgenden Schritten: Authentifizierung des Nutzers gegenuber dem ID-Token, Authentifizierung eines ersten Computersystems (136') gegenuber dem ID-Token, nach erfolgreicher Authentifizierung des Nutzers und des ersten Computersystems gegenuber dem ID-Token, Lesezugriff des ersten Computersystems auf das zumindest eine in dem ID-Token gespeicherte Attribut zur Ubertragung des zumindest einen Attributs nach dessen Signierung an ein zweites Computersystem (150), wobei die Authentifizierung des ersten Computersystems (136') gegenuber dem ID-Token aufgrund einer Attributspezifizierung (166, 168) erfolgt, die das erste Computersystem von einem dritten Computersystem (136) empfangt.

68 citations