What user-controlled identity management should learn from communities

نویسندگان

  • Katrin Borcea-Pfitzmann
  • Marit Hansen
  • Katja Liesebach
  • Andreas Pfitzmann
  • Sandra Steinbrecher
چکیده

To enable trustworthy privacy, identity management has to be user-controlled, i.e. each user administrates his/her partial identities being supported by an identity management system running on his/her machines under his/her control. Past work on user-controlled identity management focused on isolated users administrating their partial identities mainly used towards organizations, e.g., shops, public administrations and the like. But users intensively interact with other users as well. Additionally, these interactions are not only direct, but indirect, too, as, e.g., within communities. A universally usable identity management meta-system (IMMS) will have to be able to handle and combine all interac-

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Managing One' Organisational 's Identities in and Social Setting European Union's Sixth Framework Programme and the Swiss Federal Office for Education and Science. 2 Idm I 2.1 Multi

Interacting in the Internet, users should be empowered to use only those subsets of their personal attributes, called partial identities, which are appropriate for the actual situation and context. Refraining from acting under few and easily linkable partial identities is a prerequisite for trustworthy privacy. Traditionally user-controlled identity management systems primarily support individu...

متن کامل

What Can K-12 School Leaders Learn from Video Games and Gaming?

Schools have much to learn from video games and the gaming community. By providing compelling activities for motivating otherwise indifferent learners, video games can potentially help teachers improve the design of learning environments. However, there are considerable rhetorical and practical barriers between the schooling and gaming communities grounded in fundamentally different approaches ...

متن کامل

Adopting New International Health Instruments – What Can We Learn From the FCTC?; Comment on “The Legal Strength of International Health Instruments - What It Brings to Global Health Governance?”

This Commentary forms a response to Nikogosian’s and Kickbusch’s forward-looking perspective about the legal strength of international health instruments. Building on their arguments, in this commentary we consider what we can learn from the Framework Convention on Tobacco Control (FCTC) for the adoption of new legal international health instruments.

متن کامل

Access Management in Federated Digital Libraries

With the growth in digital libraries and standardization of protocols for metadata sharing, it is becoming feasible to build federated discovery services which aggregate metadata from different digital libraries (data providers) and provide a unified search interface to users. One of the obstacles that keep data providers, especially the commercial ones, from joining the federation is the lack ...

متن کامل

Marrying Transparency Tools with User-Controlled Identity Management

User-controlled identity management systems assist individuals in managing their private sphere. An individual’s privacy can be supported by transparency on processing of personal data. After giving an overview on transparency properties as well as its relation to privacy and data protection regulation, this text introduces different transparency tools: Prior to an interaction, information on t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • Inf. Sec. Techn. Report

دوره 11  شماره 

صفحات  -

تاریخ انتشار 2006