Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer (2nd ed.)
Human-computer interaction (2nd ed.)
Human-computer interaction (2nd ed.)
Identity management and its support of multilateral security
Computer Networks: The International Journal of Computer and Telecommunications Networking
Proceedings of the 13th international conference on World Wide Web
Can pseudonymity really guarantee privacy?
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Towards privacy-aware elearning
PET'05 Proceedings of the 5th international conference on Privacy Enhancing Technologies
Privacy-aware user interfaces within collaborative environments
Proceedings of the international workshop in conjunction with AVI 2006 on Context in advanced interfaces
Enhancing the Privacy of e-Learning Systems with Alias and Anonymity
Computer Supported Cooperative Work in Design IV
Supporting Local Aliases as Usable Presentation of Secure Pseudonyms
TrustBus '09 Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business
A self-certified and Sybil-free framework for secure digital identity domain buildup
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Hi-index | 0.00 |
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We discuss in this paper that besides the frequency of their use also the (re)presentation of pseudonyms influences the achievable privacy. Particularly, we point out that conflicting requirements on privacy and usability cannot be sufficiently considered by a single type of representation of pseudonyms. Hence, a PIM system should generate digital pseudonyms which are used for communication, while users assign local mnemonics to these pseudonyms in order to simplify their use. We discuss possible solutions for the support of mnemonics and, thereby, propose some improvements to privacy-enhancing identity management tools.