User centric identity management will be necessary to protect user's privacy in an electronic society. However, designing such systems is a complex task, as the expectations of the different parties involved in electronic transactions have to be met. In this work we give an overview on the actual situation in user centric identity management and point out problems encountered there. Especially we present the current state of research and mechanisms useful to protect the user's privacy. Additionally we show security problems that have to be borne in mind while designing such a system and point out possible solutions. Thereby, we concentrate on attacks on linkability and identifiability, and possible protection methods
Identities are present in the interactions between individuals and organizations. On-line shopping r...
People perform an ever increasing number of their interactions over electronic communication network...
Abstract—User-centric identity management approaches have received significant attention for managin...
aachen.de User centric identity management will be necessary to pro-tect user's privacy in an e...
Digital identities represent who we are when engaging in online activities and transactions. The ra...
This chapter introduces the concept of privacy-enhanced identity management for e-services supportin...
Digital identities represent who we are when engaging in online activities and transactions. The rap...
International audienceThe issue of user privacy is constantly brought to the spotlight since an ever...
Abstract. In this paper we highlight the need for privacy of user data used in digital identity mana...
With the technological advances and the evolution of online services, user privacy is becoming a cru...
Identity Management (IdM) systems have traditionally relied on a centralized model prone to privacy,...
Today many interactions are carried out online through Web sites and e-services and often private an...
The electronic identity (eID) is being positioned to be a basic tool for identification, authenticat...
In this paper, we describe how security and privacy can be increased in user-centric Identity Manage...
Today, one is expected to remember multiple user names and passwords for different domains when one ...
Identities are present in the interactions between individuals and organizations. On-line shopping r...
People perform an ever increasing number of their interactions over electronic communication network...
Abstract—User-centric identity management approaches have received significant attention for managin...
aachen.de User centric identity management will be necessary to pro-tect user's privacy in an e...
Digital identities represent who we are when engaging in online activities and transactions. The ra...
This chapter introduces the concept of privacy-enhanced identity management for e-services supportin...
Digital identities represent who we are when engaging in online activities and transactions. The rap...
International audienceThe issue of user privacy is constantly brought to the spotlight since an ever...
Abstract. In this paper we highlight the need for privacy of user data used in digital identity mana...
With the technological advances and the evolution of online services, user privacy is becoming a cru...
Identity Management (IdM) systems have traditionally relied on a centralized model prone to privacy,...
Today many interactions are carried out online through Web sites and e-services and often private an...
The electronic identity (eID) is being positioned to be a basic tool for identification, authenticat...
In this paper, we describe how security and privacy can be increased in user-centric Identity Manage...
Today, one is expected to remember multiple user names and passwords for different domains when one ...
Identities are present in the interactions between individuals and organizations. On-line shopping r...
People perform an ever increasing number of their interactions over electronic communication network...
Abstract—User-centric identity management approaches have received significant attention for managin...