메뉴 건너뛰기




Volumn , Issue , 2007, Pages 2-7

Controlled sharing of identity attributes for better privacy

Author keywords

Credentials; Digital identity; Federated systems; Privacy

Indexed keywords

CREDENTIALS; DIGITAL IDENTITY; FEDERATED SYSTEMS; INTERNATIONAL CONFERENCES; PRIVACY;

EID: 51349090008     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/COLCOM.2007.4553801     Document Type: Conference Paper
Times cited : (2)

References (24)
  • 2
    • 33646131730 scopus 로고    scopus 로고
    • Microsoft Corporation White Paper, 05/12/2005, Online, Available
    • K. Cameron, "The laws of identity", Microsoft Corporation White Paper, 05/12/2005. [Online]. Available: http://msdn2.microsoft.com/enus/ library/ms996456.aspx
    • The laws of identity
    • Cameron, K.1
  • 5
    • 47849103698 scopus 로고
    • Online, Available
    • "EU directive on privacy," 1995. [Online]. Available:www.cdt. org/privacy/eudirective/EU Directive.html
    • (1995) EU directive on privacy
  • 7
    • 84876196891 scopus 로고    scopus 로고
    • Children's online privacy protection act
    • Online, Available
    • "Children's online privacy protection act." [Online]. Available:www.cdt.org/legislation/105th/privacy/64fr59888.pdf
  • 8
    • 51349132233 scopus 로고    scopus 로고
    • Can-spam act. [Online]. Available: www.ftc.gov/bcp/conline/ edcams/spam/rules.htm
    • "Can-spam act." [Online]. Available: www.ftc.gov/bcp/conline/ edcams/spam/rules.htm
  • 9
    • 51349129523 scopus 로고    scopus 로고
    • U.S. federal laws, Online, Available
    • "U.S. federal laws." [Online]. Available: www.ftc.gov/privacy/ index.html
  • 10
    • 47849129409 scopus 로고    scopus 로고
    • Senate bill 1386
    • Online, Available
    • "Senate bill 1386," 2002. [Online]. Available: info.sen.ca.gov/pub/01-02/bill/sen/sb 1351-1400/sb 1386 bill 20020926 chaptered.html
    • (2002)
  • 11
    • 51349141132 scopus 로고    scopus 로고
    • C. Union, Notice of security breach state laws, 2007. [Online]. Available: www.consumersunion.org/campaigns/Breach laws May 05.pdf
    • C. Union, "Notice of security breach state laws," 2007. [Online]. Available: www.consumersunion.org/campaigns/Breach laws May 05.pdf
  • 14
    • 0012247244 scopus 로고    scopus 로고
    • Global identity management to boost personalization
    • Basel, Switzerland, September
    • M. Koch, "Global identity management to boost personalization," in Ninth Research Symposium on Emerging Electronic Markets, Basel, Switzerland, September 2002.
    • (2002) Ninth Research Symposium on Emerging Electronic Markets
    • Koch, M.1
  • 15
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete
    • D. Chaum, "Security without identification: Transaction systems to make big brother obsolete," Communications of the ACM, vol. 28, no. 10, pp. 1030-1044, 1985.
    • (1985) Communications of the ACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 16
    • 51349166061 scopus 로고    scopus 로고
    • S. Clau, A. Pfitzmann, M. Hansen, and E. Van Herreweghen, The IPTS Report, Special Issue: Identity and Privacy, pp. 8-16, 2002.
    • S. Clau, A. Pfitzmann, M. Hansen, and E. Van Herreweghen, The IPTS Report, Special Issue: Identity and Privacy, pp. 8-16, 2002.
  • 18
    • 33746653938 scopus 로고    scopus 로고
    • Managing privacy preferences for federated identity management
    • Fairfax, Virginia, USA
    • G.-J. Ahn and J. Lam, "Managing privacy preferences for federated identity management," in 2005 workshop on Digital identity management, Fairfax, Virginia, USA, 2005.
    • (2005) 2005 workshop on Digital identity management
    • Ahn, G.-J.1    Lam, J.2
  • 19
    • 51349084849 scopus 로고    scopus 로고
    • F. T. Commission, Online profiling - a report to congress, part 2, Tech. Rep., 2002.
    • F. T. Commission, "Online profiling - a report to congress, part 2," Tech. Rep., 2002.
  • 21
    • 0141873829 scopus 로고    scopus 로고
    • Efficient authenticated dictionaries with skip lists and commutative hashing
    • Technical Report, Johns Hopkins Information, Security Institute
    • Goodrich, M. T.. & Tamassia, R., "Efficient authenticated dictionaries with skip lists and commutative hashing", Technical Report, Johns Hopkins Information, Security Institute, 2000.
    • (2000)
    • Goodrich, M.T.1    Tamassia, R.2
  • 22
    • 51349122423 scopus 로고    scopus 로고
    • Cormen, T., Leiserson, C., Rivest, R., & Stein, C. Introduction to Algorithms. MIT Press, 2001. Knuth, D., The Art of Computer Programming, 2: Seminumerical Algorithms, Addison-Wesley, 1997.
    • Cormen, T., Leiserson, C., Rivest, R., & Stein, C. Introduction to Algorithms. MIT Press, 2001. Knuth, D., The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Addison-Wesley, 1997.
  • 23
    • 0003294665 scopus 로고    scopus 로고
    • The Art of Computer Programming
    • Addison-Wesley
    • Knuth, D., The Art of Computer Programming, Volume 2: Seminumerical Algorithms, Addison-Wesley, 1997.
    • (1997) Seminumerical Algorithms , vol.2
    • Knuth, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.