This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a scenario, two opposite needs seem to emerge. On one side, the service provider may want to control, in first place, the user accessing its resources, i.e., without being forced to delegate the issuing of access permissions to third parties to meet privacy requirements. On the other side, it should be technically possible to trace back the real identity of a user upon dishonest behavior, and of course, this must be necessary accomplished by an external authority distinct from the provider itself. The framework described in this paper aims at coping with these two opposite needs. This is accomplished through (i) a distributed third-party-based inf...
As personal information increases in value, the incentives for re-mote services to collect as much o...
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudo...
Paper presented by Mowbray at the Privacy Workshop, chaired by Edwards and held in September 2005
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
AbstractThis paper deals with privacy-preserving (pseudonymized) access to a service resource. In su...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
In service providing systems, user authentication is required for different purposes such as billing...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
The advent of the information age has brought a proliferation in the amount of information that is a...
Abstract—Pseudonyms are pseudonymous certificates, which are regarded as a silver bullet to meet the...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servi...
As personal information increases in value, the incentives for re-mote services to collect as much o...
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudo...
Paper presented by Mowbray at the Privacy Workshop, chaired by Edwards and held in September 2005
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
AbstractThis paper deals with privacy-preserving (pseudonymized) access to a service resource. In su...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
In service providing systems, user authentication is required for different purposes such as billing...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Pseudonym systems allow users to interact with multiple organizations anonymously by using pseudonym...
The advent of the information age has brought a proliferation in the amount of information that is a...
Abstract—Pseudonyms are pseudonymous certificates, which are regarded as a silver bullet to meet the...
Anonymous Single-Sign-On authentication schemes have been proposed to allow users to access a servi...
As personal information increases in value, the incentives for re-mote services to collect as much o...
A pseudonym provides anonymity by protecting the identity of a legitimate user. A user with a pseudo...
Paper presented by Mowbray at the Privacy Workshop, chaired by Edwards and held in September 2005