User Identity and Ubiquitous Computing: User Selected Pseudonyms

نویسندگان

  • Craig Chatfield
  • René Hexel
چکیده

As ubiquitous computing environments become more prevalent they will cover more and more of our public and private lives. Users will be able to interact with these environments to purchase goods, receive services and share information in ways unheard of today. But the success of these environments will be dependent on users’ willingness to accept and manage the privacy risks of sharing their personal information within this new digital world. This paper describes the concept of User Selected Pseudonyms, a method of allowing users to manage their identity in ubiquitous computing environments. This method of interaction allows users to control, either directly or through privacy preferences, what information about themselves they share with an environment to manage the risks to their privacy. The selected user information can then be used by the environments to personalise delivery of information and services. User Selected Pseudonyms allow personalised delivery of intelligent environment services while allowing users to maintain their desired level of anonymity.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability

In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However, his identity cannot be revealed and linked to other pseudonyms unless solving the computational Diffie-Hellman problem. In the second variant a set R of revocation centers is able to revoke the anonymity in collabora...

متن کامل

A Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS)

In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. The aim ofthis study is building a prototype of a hospital dashboard on the principles andguidelines of dashboards and evaluating it based on End UserComputing Satisfaction (EUCS). The...

متن کامل

Unique User - generated Digital Pseudonyms ⋆ Updated : 2007

This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except un...

متن کامل

Information Disclosure in Identity Management

User Controlled Identity Management Systems have the goal to hinder the linkability between the different digital identities of a user. We perform a theoretical and an experimental study of the following information leakage problem: given a consistent view on the actions of a strong identity management system (e.g. Idemix ) where k users pseudonymously issue and show some credentials, do these ...

متن کامل

Information Disclosure in Identity Management

User Controlled Identity Management Systems have the goal to hinder the linkability between the different digital identities of a user. We perform a theoretical and an experimental study of the following information leakage problem: given a consistent view on the actions of a strong identity management system (e.g. Idemix ) where k users pseudonymously issue and show some credentials, do these ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006