Marrying Transparency Tools with User-Controlled Identity Management
نویسنده
چکیده
User-controlled identity management systems assist individuals in managing their private sphere. An individual’s privacy can be supported by transparency on processing of personal data. After giving an overview on transparency properties as well as its relation to privacy and data protection regulation, this text introduces different transparency tools: Prior to an interaction, information on the interacting party should be made transparent. During the interaction, privacy policies have to be communicated. Afterwards, users should be helped in exercising their privacy rights such as, among others, the right to access own personal data. In addition information on security and privacy incidents provides complementary data for the user’s perception of the level of privacy. Although transparency tools alone are no panacea for maintaining the private sphere, the combination of transparency tools and usercontrolled identity management systems yields viable functionality to empower users to protect their privacy.
منابع مشابه
Transparency Tools for User-Controlled Identity Management
Transparency is an important precondition for the users’ control over their privacy. It can increase the users’ trust in accurate and secure processing of their personal data. This paper presents concepts and implementations of different transparency tools, which are employed in a user-controlled identity management system of the project PRIME – Privacy and Identity Management for Europe. A foc...
متن کاملThe Limits of Control - (Governmental) Identity Management from a Privacy Perspective
The emergence of identity management indicates that the process of identification has reached a stage where analog and digital environments converge. This is also reflected in the increased efforts of governments to introduce electronic ID systems, aiming at security improvements of public services and unifying identification procedures to contribute to administrative efficiency. Though privacy...
متن کاملWhat user-controlled identity management should learn from communities
To enable trustworthy privacy, identity management has to be user-controlled, i.e. each user administrates his/her partial identities being supported by an identity management system running on his/her machines under his/her control. Past work on user-controlled identity management focused on isolated users administrating their partial identities mainly used towards organizations, e.g., shops, ...
متن کاملA First Look at Identity Management Schemes on the Blockchain
The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity informat...
متن کاملSecure User-Controlled Lightpath Provisioning with User-Controlled Identity Management
To allow user applications to securely make use of various lightpath resources distributed across multiple domains in a user-friendly and privacypreserving way requires identity management functionality. Identity and attribute information has to be provided by the user to allow for authorized access to these resources. An identity management framework can facilitate such information exchange. W...
متن کامل