Proceedings of the 2005 Workshop on Digital Identity Management 2005
DOI: 10.1145/1102486.1102498
|View full text |Cite
|
Sign up to set email alerts
|

Usable presentation of secure pseudonyms

Abstract: Privacy-Enhancing Identity Management (PIM) enables users to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy. Particularly, we point … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2006
2006
2014
2014

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(5 citation statements)
references
References 3 publications
0
5
0
Order By: Relevance
“…Concerning the provided degree of linkability, pseudonyms can be classified into transaction pseudonyms, role pseudonyms, relationship pseudonyms, rolerelationship pseudonyms and person pseudonyms. While a discussion of this issue can be found in [23], we see our approach as a conceptual combination of both transaction and person pseudonyms. The ability to use changing tracking pseudonyms in a freely determined frequency relates to the first property, while the implicit attribute can be interpreted as an implicit person pseudonym.…”
Section: Related Workmentioning
confidence: 99%
“…Concerning the provided degree of linkability, pseudonyms can be classified into transaction pseudonyms, role pseudonyms, relationship pseudonyms, rolerelationship pseudonyms and person pseudonyms. While a discussion of this issue can be found in [23], we see our approach as a conceptual combination of both transaction and person pseudonyms. The ability to use changing tracking pseudonyms in a freely determined frequency relates to the first property, while the implicit attribute can be interpreted as an implicit person pseudonym.…”
Section: Related Workmentioning
confidence: 99%
“…Digital identity management [2,3,4,5,6] has brought much more attention to the information security research communities. In [2], a unique identifier is assigned to a user for a federation system.…”
Section: Related Workmentioning
confidence: 99%
“…As networks are "unforgetful" and may log and remember a close to infinite number of network interactions, this separation decreases the privacy risks associated with interacting in a computer network. Many scientific papers have been dedicated to various types of pseudonymity [5,19,4] or the graceful degradation of anonymity towards full identification [1] using existing approaches.…”
Section: The Need For Sybil-free Applicationsmentioning
confidence: 99%