Proceedings of the 13th international conference on World Wide Web
Usable presentation of secure pseudonyms
Proceedings of the 2005 workshop on Digital identity management
Privacy enhancing identity management: protection against re-identification and profiling
Proceedings of the 2005 workshop on Digital identity management
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
A Comprehensive Approach for Context-dependent Privacy Management
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
De-anonymizing Social Networks
SP '09 Proceedings of the 2009 30th IEEE Symposium on Security and Privacy
The concept of workspaces: redefined for e-learning
Advanced Technology for Learning
Privacy-enhanced web personalization
The adaptive web
Decentralized generation of multiple, uncorrelatable pseudonyms without trusted third parties
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Hi-index | 0.00 |
Privacy-Enhancing Identity Management (PIM) enables users to control which personal data they provide to whom by partitioning this information into subsets called partial identities. Since these partial identities should not be linkable except by their owner, randomly generated pseudonyms that are unique are used as their identifiers instead of real names. Randomly generated pseudonyms do not leak any information about the corresponding user, but their handling is not easy for human beings. Users should therefore be enabled to assign local aliases according to their individual preferences to such pseudonyms to allow for a better recognizability in interaction scenarios. However, the use of local aliases requires a reasonable support to ensure both privacy and usability. This paper introduces an architecture that enables users to manage local aliases in a reasonable and usable way. Possible solutions for alias assignment, alias improvement, and replacement between aliases and pseudonyms are discussed. The suggested approach was realized within a collaborative eLearning environment but is also applicable for other collaborative applications.