User Identity and Ubiquitous Computing: User Selected Pseudonyms
نویسندگان
چکیده
As ubiquitous computing environments become more prevalent they will cover more and more of our public and private lives. Users will be able to interact with these environments to purchase goods, receive services and share information in ways unheard of today. But the success of these environments will be dependent on users’ willingness to accept and manage the privacy risks of sharing their personal information within this new digital world. This paper describes the concept of User Selected Pseudonyms, a method of allowing users to manage their identity in ubiquitous computing environments. This method of interaction allows users to control, either directly or through privacy preferences, what information about themselves they share with an environment to manage the risks to their privacy. The selected user information can then be used by the environments to personalise delivery of information and services. User Selected Pseudonyms allow personalised delivery of intelligent environment services while allowing users to maintain their desired level of anonymity.
منابع مشابه
Anonymous Authentication with Optional Shared Anonymity Revocation and Linkability
In this paper we propose three smartcard-based variants of anonymous authentication using unique one-time pseudonyms. The first variant can be used to authenticate a user. However, his identity cannot be revealed and linked to other pseudonyms unless solving the computational Diffie-Hellman problem. In the second variant a set R of revocation centers is able to revoke the anonymity in collabora...
متن کاملA Prototyping and Evaluation of Hospital Dashboard through End-User Computing Satisfaction Model (EUCS)
In today's competitive environment, one of the new tools in the field ofinformation technology is business or organizational dashboards that are as abackup in the process of strategic management of organizations. The aim ofthis study is building a prototype of a hospital dashboard on the principles andguidelines of dashboards and evaluating it based on End UserComputing Satisfaction (EUCS). The...
متن کاملUnique User - generated Digital Pseudonyms ⋆ Updated : 2007
This paper presents a method to generate unique and nevertheless highly random pseudonyms in a distributed environment. More precisely, each user can now generate his pseudonym locally in his personal security environment, e.g. in his smart card or his personal digital assistant. There is no need for any information interchange between issuing parties or global data (especially keys), except un...
متن کاملInformation Disclosure in Identity Management
User Controlled Identity Management Systems have the goal to hinder the linkability between the different digital identities of a user. We perform a theoretical and an experimental study of the following information leakage problem: given a consistent view on the actions of a strong identity management system (e.g. Idemix ) where k users pseudonymously issue and show some credentials, do these ...
متن کاملInformation Disclosure in Identity Management
User Controlled Identity Management Systems have the goal to hinder the linkability between the different digital identities of a user. We perform a theoretical and an experimental study of the following information leakage problem: given a consistent view on the actions of a strong identity management system (e.g. Idemix ) where k users pseudonymously issue and show some credentials, do these ...
متن کامل