What user-controlled identity management should learn from communities

被引:6
|
作者
Borcea-Pfitzmann, Katrin [1 ]
Hansen, Marit [2 ]
Liesebach, Katja [1 ]
Pfitzmann, Andreas [1 ]
Steinbrecher, Sandra [1 ]
机构
[1] TU Dresden, Department of Computer Science, 01062 Dresden, Germany
[2] Independent Centre for Privacy Protection Schleswig-Holstein, Holstenstraße 98, 24103 Kiel, Germany
来源
Information Security Technical Report | 2006年 / 11卷 / 03期
关键词
Computer software - Data processing - Human computer interaction - Security of data - Security systems - User interfaces;
D O I
10.1016/j.istr.2006.03.008
中图分类号
学科分类号
摘要
To enable trustworthy privacy, identity management has to be user-controlled, i.e. each user administrates his/her partial identities being supported by an identity management system running on his/her machines under his/her control. Past work on user-controlled identity management focused on isolated users administrating their partial identities mainly used towards organizations, e.g., shops, public administrations and the like. But users intensively interact with other users as well. Additionally, these interactions are not only direct, but indirect, too, as, e.g., within communities. A universally usable identity management meta-system (IMMS) will have to be able to handle and combine all interactions possible. For the sake of privacy, users interacting with organizations might minimize the personal information transmitted in the context of AAA (authentication, authorization, and accounting) without losing functionality. But users interacting with other users, in particular within a community, have to share additional supportive information, e.g., awareness information. Otherwise, neither a community nor team spirit will develop. Balancing privacy and functionality in communities is a current research question. Therefore, an IMMS has to be flexible enough to incorporate new knowledge and demands as they develop. © 2006 Elsevier Ltd. All rights reserved.
引用
收藏
页码:119 / 128
相关论文
共 50 条
  • [1] Secure User-Controlled Lightpath Provisioning with User-Controlled Identity Management
    Hulsebosch, Bob
    de Groote, Robert
    Snijders, Martin
    SCALABILITY OF NETWORKS AND SERVICES, PROCEEDINGS, 2009, 5637 : 1 - 14
  • [2] Unleashing the Disruptive Potential of User-Controlled Identity Management
    Minerva, Roberto
    Crespi, Noel
    2011 TECHNICAL SYMPOSIUM AT ITU TELECOM WORLD (ITU WT), 2011, : 1 - 6
  • [3] Marrying transparency tools with user-controlled identity management
    Hansen, Marit
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2008, : 199 - 220
  • [4] User-Controlled Identity Provisioning for Secure Account Sharing
    Liu, Dongxi
    Zic, John
    2014 IEEE 7TH INTERNATIONAL CONFERENCE ON CLOUD COMPUTING (CLOUD), 2014, : 644 - 651
  • [5] User-controlled resource management in federated clouds
    Mosch, Marc
    Gross, Stephan
    Schill, Alexander
    JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2014, 3 (03): : 1 - 18
  • [6] Residents Lead: User-Controlled Housing Practices and Attitudes in Poor Communities in Cairo, Egypt
    Ahmed, Khaled
    INTERNATIONAL PLANNING STUDIES, 2015, 20 (03) : 180 - 208
  • [7] Workforce management in operations: what enterprising communities can learn from this?
    Fernandes, Cristina
    Ferreira, Joao
    Veiga, Pedro Mota
    JOURNAL OF ENTERPRISING COMMUNITIES-PEOPLE AND PLACES IN THE GLOBAL ECONOMY, 2023, 17 (06) : 1467 - 1494
  • [8] WHAT WE SHOULD LEARN FROM VIETNAM
    FALK, RA
    FOREIGN POLICY, 1970, (01) : 98 - 114
  • [9] What economists should learn from econophysics
    McCauley, Joseph L.
    Gunaratne, Gemunu H.
    Bassler, Kevin E.
    DYNAMICS OF COMPLEX INTERCONNECTED SYSTEMS: NETWORKS AND BIOPROCESSES, 2006, 232 : 191 - +
  • [10] WHAT WE SHOULD LEARN FROM MATERIALISM
    TRUBETSKOI, SN
    VOPROSY FILOSOFII, 1989, (05) : 103 - 111