Secure Identity Management for Pseudo-Anonymous Service Access
In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; an...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 55 |
---|---|
container_issue | |
container_start_page | 48 |
container_title | |
container_volume | |
creator | Hitchens, Michael Kay, Judy Kummerfeld, Bob Brar, Ajay |
description | In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; and mechanisms for users to share such personas with service providers. A trust-based approach supports decisions about accepting personas. We describe a prototype implementation and performance evaluations. |
doi_str_mv | 10.1007/978-3-540-32004-3_6 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>pascalfrancis_sprin</sourceid><recordid>TN_cdi_pascalfrancis_primary_16923862</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>16923862</sourcerecordid><originalsourceid>FETCH-LOGICAL-p227t-8f958c2ca4a20eab981dbb2c06dbca5332e06b2f14fc847c7f1113888e68dc473</originalsourceid><addsrcrecordid>eNotkE9PAjEQxeu_REQ-gZe9eKx2Ot1uezEhBJUEowl6brrdlqzCLmnBhG9vAecy8-a9vMOPkDtgD8BY9agrRZGWglHkjAmKRp6RG8yPo2bnZAASgCIKfUFGOX7weFlyKC_JgCHjVFcCr8kopW-WB0FroQbkaeHdLvpi1vhu2273xZvt7NKvsypCH4uP5HdNT8dd3-3X_S4VCx9_W-eLsXM-pVtyFewq-dH_HpKv5-nn5JXO319mk_GcbjivtlQFXSrHnRWWM29rraCpa-6YbGpnS0Tumax5ABGcEpWrAgCgUspL1ThR4ZDcn3o3Njm7CtF2rk1mE9u1jXsDUnNUkuccnHIpW93SR1P3_U8ywMwBpMlkDJrMxhzB5VviH9m9YJA</addsrcrecordid><sourcetype>Index Database</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Secure Identity Management for Pseudo-Anonymous Service Access</title><source>Springer Books</source><creator>Hitchens, Michael ; Kay, Judy ; Kummerfeld, Bob ; Brar, Ajay</creator><contributor>Hutter, Dieter ; Ullmann, Markus</contributor><creatorcontrib>Hitchens, Michael ; Kay, Judy ; Kummerfeld, Bob ; Brar, Ajay ; Hutter, Dieter ; Ullmann, Markus</creatorcontrib><description>In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; and mechanisms for users to share such personas with service providers. A trust-based approach supports decisions about accepting personas. We describe a prototype implementation and performance evaluations.</description><identifier>ISSN: 0302-9743</identifier><identifier>ISBN: 9783540255215</identifier><identifier>ISBN: 3540255214</identifier><identifier>EISSN: 1611-3349</identifier><identifier>EISBN: 3540320040</identifier><identifier>EISBN: 9783540320043</identifier><identifier>DOI: 10.1007/978-3-540-32004-3_6</identifier><language>eng</language><publisher>Berlin, Heidelberg: Springer Berlin Heidelberg</publisher><subject>Applied sciences ; Computer science; control theory; systems ; Computer systems and distributed systems. User interface ; Exact sciences and technology ; Memory and file management (including protection and security) ; Memory organisation. Data processing ; Software</subject><ispartof>Lecture notes in computer science, 2005, p.48-55</ispartof><rights>Springer-Verlag Berlin Heidelberg 2005</rights><rights>2005 INIST-CNRS</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://link.springer.com/content/pdf/10.1007/978-3-540-32004-3_6$$EPDF$$P50$$Gspringer$$H</linktopdf><linktohtml>$$Uhttps://link.springer.com/10.1007/978-3-540-32004-3_6$$EHTML$$P50$$Gspringer$$H</linktohtml><link.rule.ids>309,310,775,776,780,785,786,789,4035,4036,27904,38234,41421,42490</link.rule.ids><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=16923862$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><contributor>Hutter, Dieter</contributor><contributor>Ullmann, Markus</contributor><creatorcontrib>Hitchens, Michael</creatorcontrib><creatorcontrib>Kay, Judy</creatorcontrib><creatorcontrib>Kummerfeld, Bob</creatorcontrib><creatorcontrib>Brar, Ajay</creatorcontrib><title>Secure Identity Management for Pseudo-Anonymous Service Access</title><title>Lecture notes in computer science</title><description>In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; and mechanisms for users to share such personas with service providers. A trust-based approach supports decisions about accepting personas. We describe a prototype implementation and performance evaluations.</description><subject>Applied sciences</subject><subject>Computer science; control theory; systems</subject><subject>Computer systems and distributed systems. User interface</subject><subject>Exact sciences and technology</subject><subject>Memory and file management (including protection and security)</subject><subject>Memory organisation. Data processing</subject><subject>Software</subject><issn>0302-9743</issn><issn>1611-3349</issn><isbn>9783540255215</isbn><isbn>3540255214</isbn><isbn>3540320040</isbn><isbn>9783540320043</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2005</creationdate><recordtype>conference_proceeding</recordtype><recordid>eNotkE9PAjEQxeu_REQ-gZe9eKx2Ot1uezEhBJUEowl6brrdlqzCLmnBhG9vAecy8-a9vMOPkDtgD8BY9agrRZGWglHkjAmKRp6RG8yPo2bnZAASgCIKfUFGOX7weFlyKC_JgCHjVFcCr8kopW-WB0FroQbkaeHdLvpi1vhu2273xZvt7NKvsypCH4uP5HdNT8dd3-3X_S4VCx9_W-eLsXM-pVtyFewq-dH_HpKv5-nn5JXO319mk_GcbjivtlQFXSrHnRWWM29rraCpa-6YbGpnS0Tumax5ABGcEpWrAgCgUspL1ThR4ZDcn3o3Njm7CtF2rk1mE9u1jXsDUnNUkuccnHIpW93SR1P3_U8ywMwBpMlkDJrMxhzB5VviH9m9YJA</recordid><startdate>2005</startdate><enddate>2005</enddate><creator>Hitchens, Michael</creator><creator>Kay, Judy</creator><creator>Kummerfeld, Bob</creator><creator>Brar, Ajay</creator><general>Springer Berlin Heidelberg</general><general>Springer</general><scope>IQODW</scope></search><sort><creationdate>2005</creationdate><title>Secure Identity Management for Pseudo-Anonymous Service Access</title><author>Hitchens, Michael ; Kay, Judy ; Kummerfeld, Bob ; Brar, Ajay</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-p227t-8f958c2ca4a20eab981dbb2c06dbca5332e06b2f14fc847c7f1113888e68dc473</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2005</creationdate><topic>Applied sciences</topic><topic>Computer science; control theory; systems</topic><topic>Computer systems and distributed systems. User interface</topic><topic>Exact sciences and technology</topic><topic>Memory and file management (including protection and security)</topic><topic>Memory organisation. Data processing</topic><topic>Software</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Hitchens, Michael</creatorcontrib><creatorcontrib>Kay, Judy</creatorcontrib><creatorcontrib>Kummerfeld, Bob</creatorcontrib><creatorcontrib>Brar, Ajay</creatorcontrib><collection>Pascal-Francis</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Hitchens, Michael</au><au>Kay, Judy</au><au>Kummerfeld, Bob</au><au>Brar, Ajay</au><au>Hutter, Dieter</au><au>Ullmann, Markus</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Secure Identity Management for Pseudo-Anonymous Service Access</atitle><btitle>Lecture notes in computer science</btitle><date>2005</date><risdate>2005</risdate><spage>48</spage><epage>55</epage><pages>48-55</pages><issn>0302-9743</issn><eissn>1611-3349</eissn><isbn>9783540255215</isbn><isbn>3540255214</isbn><eisbn>3540320040</eisbn><eisbn>9783540320043</eisbn><abstract>In this paper, we propose an architecture to enable service providers personalise services in a pervasive environment, while minimising risks to users’ privacy. We describe the design of two critical parts of such systems: a mechanism forr defining authenticated personas that can be pseudonymous; and mechanisms for users to share such personas with service providers. A trust-based approach supports decisions about accepting personas. We describe a prototype implementation and performance evaluations.</abstract><cop>Berlin, Heidelberg</cop><pub>Springer Berlin Heidelberg</pub><doi>10.1007/978-3-540-32004-3_6</doi><tpages>8</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0302-9743 |
ispartof | Lecture notes in computer science, 2005, p.48-55 |
issn | 0302-9743 1611-3349 |
language | eng |
recordid | cdi_pascalfrancis_primary_16923862 |
source | Springer Books |
subjects | Applied sciences Computer science control theory systems Computer systems and distributed systems. User interface Exact sciences and technology Memory and file management (including protection and security) Memory organisation. Data processing Software |
title | Secure Identity Management for Pseudo-Anonymous Service Access |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T10%3A22%3A32IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-pascalfrancis_sprin&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Secure%20Identity%20Management%20for%20Pseudo-Anonymous%20Service%20Access&rft.btitle=Lecture%20notes%20in%20computer%20science&rft.au=Hitchens,%20Michael&rft.date=2005&rft.spage=48&rft.epage=55&rft.pages=48-55&rft.issn=0302-9743&rft.eissn=1611-3349&rft.isbn=9783540255215&rft.isbn_list=3540255214&rft_id=info:doi/10.1007/978-3-540-32004-3_6&rft_dat=%3Cpascalfrancis_sprin%3E16923862%3C/pascalfrancis_sprin%3E%3Curl%3E%3C/url%3E&rft.eisbn=3540320040&rft.eisbn_list=9783540320043&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |