Design and implementation of the idemix anonymous credential system
Proceedings of the 9th ACM conference on Computer and communications security
Mobile Applications: Architecture, Design, and Development
Mobile Applications: Architecture, Design, and Development
Designing the User Interface: Strategies for Effective Human-Computer Interaction (4th Edition)
Designing the User Interface: Strategies for Effective Human-Computer Interaction (4th Edition)
An architecture for privacy-sensitive ubiquitous computing
Proceedings of the 2nd international conference on Mobile systems, applications, and services
Security and Usability
A Survey of User-centric Identity Management Technologies
SECUREWARE '07 Proceedings of the The International Conference on Emerging Security Information, Systems, and Technologies
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Designing the User Interface: Strategies for Effective Human-Computer Interaction
Mobile Application Security
Anonymous credentials on a standard java card
Proceedings of the 16th ACM conference on Computer and communications security
HCSE'10 Proceedings of the Third international conference on Human-centred software engineering
Hi-index | 0.00 |
Access rights management is in the middle of many collaboration forms such as group formation or sharing of information in different kinds of scenarios. There are some strong mechanisms to achieve this, like anonymous credential systems. However in general their usage is not very intuitive for lay users. In this paper we show the potential of using proof-based credential systems like Idemix to enhance the usability of privacy-respecting social interaction in different collaborative settings. For instance transparently performing authorization without any user intervention at the level of the user interface becomes possible. In order to improve the usability, we complement this by introducing a mental model for intuitive management of digital identities. The approach should also empower users to define their own access restrictions when sharing data, by building custom proof specifications on the fly. We show this exemplary with a developed prototype application for supporting collaborative scenarios on a mobile device. We also present first evaluation results of an early prototype and address current as well as future work.