메뉴 건너뛰기




Volumn 11, Issue 3, 2006, Pages 119-128

What user-controlled identity management should learn from communities

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER SOFTWARE; DATA PROCESSING; HUMAN COMPUTER INTERACTION; SECURITY OF DATA; SECURITY SYSTEMS; USER INTERFACES;

EID: 33747186401     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2006.03.008     Document Type: Article
Times cited : (13)

References (11)
  • 1
    • 33747202578 scopus 로고    scopus 로고
    • Bauer M., Meints M., and Hansen M. (Eds) [current May 2006]
    • In: Bauer M., Meints M., and Hansen M. (Eds). D3.1: structured overview on prototypes and concepts of identity management systems. Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society, V1.1 (September 2005). http://fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_IMS.final.pdf [current May 2006]
    • (2005) Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society, V1.1
  • 2
    • 33747184932 scopus 로고    scopus 로고
    • Borcea K, Donker H, Franz E, Liesebach K, Pfitzmann A, Wahrig H. Intra-application partitioning of personal data. In: Proceedings of workshop on privacy-enhanced personalization (PEP 2005), Edinburgh, UK; 2005, http://www.isr.uci.edu/pep05/papers/borcea-pep.pdf [current May 2006].
  • 3
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • [current May 2006]
    • Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM 28 10 (October 1985) 1030-1044. http://chaum.com/articles/Security_Wthout_Identification.htm [current May 2006]
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 4
    • 57249106771 scopus 로고    scopus 로고
    • Dourish P, Bly S. Portholes: supporting awareness in a distributed work group. In: Proceedings of ACM CHI'92 conference on human factors in computing system, http://www.ics.uci.edu/∼jpd/publications/1992/chi92-portholes.pdf; 1992. p. 541-7 [current May 2006].
  • 5
    • 0039246956 scopus 로고    scopus 로고
    • The social cost of cheap pseudonyms
    • [Version of 1998: Mimeo, Version of 2001] [Version of Aug 1999, current May 2006]
    • Friedman E.J., and Resnick P. The social cost of cheap pseudonyms. [Version of 1998: Mimeo, Version of 2001]. Journal of Economics and Management Strategy 10 2 (1998) 173-199. http://www.si.umich.edu/∼presnick/papers/identifiers/081199.pdf [Version of Aug 1999, current May 2006]
    • (1998) Journal of Economics and Management Strategy , vol.10 , Issue.2 , pp. 173-199
    • Friedman, E.J.1    Resnick, P.2
  • 6
    • 33750937109 scopus 로고    scopus 로고
    • Franz E, Böttcher A, Wahrig H, Borcea-Pfitzmann K. Access control in a privacy-aware eLearning environment. In: Proceedings of AReS 2006, workshop on security in eLearning (SEL), Vienna; April 2006.
  • 8
    • 33747196800 scopus 로고    scopus 로고
    • Pfitzmann A, Hansen M. Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Working paper v0.28, http://dud.inf.tu-dresden.de/Anon_Terminology.shtml; May 2006 [current May 2006].
  • 9
    • 1642344244 scopus 로고    scopus 로고
    • IT security and multilateral security
    • Multilateral security in communications. Müller G., and Rannenberg K. (Eds), Addison-Wesley, München
    • Rannenberg K., Pfitzmann A., and Müller G. IT security and multilateral security. In: Müller G., and Rannenberg K. (Eds). Multilateral security in communications. Technology, infrastructure, economy vol. 3 (1999), Addison-Wesley, München 21-29
    • (1999) Technology, infrastructure, economy , vol.3 , pp. 21-29
    • Rannenberg, K.1    Pfitzmann, A.2    Müller, G.3
  • 10
    • 33845539701 scopus 로고    scopus 로고
    • Steinbrecher S. Design options for privacy-respecting reputation systems within centralized Internet communities. In: Fischer-Hübner S, Rannenberg K, Yngström L, Lindskog S, editors. Proceedings of the IFIP TC-11 21st international information security conference (SEC 2006), 22-24 May, 2006, Karlstad, Sweden. International Federation for Information Processing (IFIP), vol. 201. Springer; 2006.
  • 11
    • 0033717446 scopus 로고    scopus 로고
    • Properties of protection goals and their integration into a user interface
    • Wolf G., and Pfitzmann A. Properties of protection goals and their integration into a user interface. Computer Networks 32 6 (2000) 685-700
    • (2000) Computer Networks , vol.32 , Issue.6 , pp. 685-700
    • Wolf, G.1    Pfitzmann, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.