We propose an identity management system that supports role-based pseudonyms that are bound to a given set of services (service contexts) and support the use of reputation systems. Our proposal offers a solution for the problem of providing privacy protection and reputation mechanisms concurrently. The trust information used to evaluate the reputation of users is dynamic and associated to their pseudonyms. In particular, our solution does not require the support or assistance from central authorities during the operation phase. Moreover, the presented scheme provides inherent detection and mitigation of Sybil attacks. Finally, we present an attacker model and evaluate the security and privacy properties and robustness of our soluti...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booki...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
Abstract. An attacker who can control arbitrarily many user identities can break the security proper...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
As personal information increases in value, the incentives for re-mote services to collect as much o...
In service providing systems, user authentication is required for different purposes such as billing...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
In the field of cloud computing, most research on identity management has concentrated on protecting...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from...
We propose an identity management system that supports role-based pseudonyms that are bound to a gi...
We propose an identity management system that supports role-based pseudonymsthat are bound to a give...
In this paper, we propose an architecture to enable service providers personalise services in a perv...
Electronic transactions are becoming more important everyday. Several tasks like buying goods, booki...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
Abstract. An attacker who can control arbitrarily many user identities can break the security proper...
This paper deals with privacy-preserving (pseudonymized) access to a service resource. In such a sce...
As personal information increases in value, the incentives for re-mote services to collect as much o...
In service providing systems, user authentication is required for different purposes such as billing...
Collecting accurate profile information and protecting an individual's privacy are ordinarily v...
In the field of cloud computing, most research on identity management has concentrated on protecting...
The architectures of deployed anonymity systems such as that of the Tor net-work suffer from the pro...
The architectures of deployed anonymity systems such as that of the Tor network suffer from the probl...
User data on the Internet are extremely easy to leak, and the anonymity and security issues of users...
Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from...