메뉴 건너뛰기




Volumn 13, Issue 2, 2008, Pages 83-94

Identity management throughout one's whole life

Author keywords

Identity; Identity management; PET; Privacy; Privacy enhancing identity management system; Privacy enhancing technologies; User controlled identity management system

Indexed keywords

DIGITAL ARITHMETIC;

EID: 52949149718     PISSN: 13634127     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.istr.2008.06.003     Document Type: Article
Times cited : (19)

References (23)
  • 2
    • 45949103706 scopus 로고    scopus 로고
    • D3.1: structured overview on prototypes and concepts of identity management systems
    • Bauer M., Meints M., and Hansen M. (Eds) [current June 2008]
    • D3.1: structured overview on prototypes and concepts of identity management systems. In: Bauer M., Meints M., and Hansen M. (Eds). Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society (2005). http://fidis.net/fileadmin/fidis/deliverables/fidis-wp3-del3.1.overview_on_IMS.final.pdf [current June 2008]
    • (2005) Deliverable 3.1 in the network of excellence FIDIS - future of identity in the information society
  • 4
    • 33748538996 scopus 로고    scopus 로고
    • Perspectives for cryptographic long-term security
    • no. 9, p. 50-55
    • Buchmann J., May A., and Vollmer U. Perspectives for cryptographic long-term security. Communications of the ACM vol. 49 (Sep. 2006) no. 9, p. 50-55
    • (2006) Communications of the ACM , vol.49
    • Buchmann, J.1    May, A.2    Vollmer, U.3
  • 5
    • 33749684958 scopus 로고    scopus 로고
    • Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
    • IBM Research
    • Camenisch J., and Lysyanskaya A. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Research report RZ 3295 (# 93341) (Nov. 2000), IBM Research
    • (2000) Research report RZ 3295 (# 93341)
    • Camenisch, J.1    Lysyanskaya, A.2
  • 7
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • no. 2, p. 84-8
    • Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM vol. 24 (Feb. 1981) no. 2, p. 84-8
    • (1981) Communications of the ACM , vol.24
    • Chaum, D.1
  • 8
    • 0022145479 scopus 로고
    • Security without identification: transaction systems to make big brother obsolete
    • [current June 2008]
    • Chaum D. Security without identification: transaction systems to make big brother obsolete. Communications of the ACM vol. 28 (Oct. 1985). http://chaum.com/articles/Security_Wthout_Identification.htm [current June 2008]
    • (1985) Communications of the ACM , vol.28
    • Chaum, D.1
  • 12
    • 45949106550 scopus 로고    scopus 로고
    • Hansen M. Marrying transparency tools with user-controlled identity management. In: Proceedings of the IFIP & FIDIS summer school 2007. IFIP Publisher Springer Science and Business Media; 2008. p. 199-222.
    • Hansen M. Marrying transparency tools with user-controlled identity management. In: Proceedings of the IFIP & FIDIS summer school 2007. IFIP Publisher Springer Science and Business Media; 2008. p. 199-222.
  • 14
    • 84902170557 scopus 로고    scopus 로고
    • Hansen M., and Meissner S. (Eds), Lulu Inc. [current June 2008]
    • In: Hansen M., and Meissner S. (Eds). Verkettung digitaler Identitäten (2007), Lulu Inc. https://www.datenschutzzentrum.de/projekte/verkettung/ [current June 2008]
    • (2007) Verkettung digitaler Identitäten
  • 16
    • 52949107496 scopus 로고    scopus 로고
    • Leenes R., Schallaböck J., and Hansen M. (Eds) [current June 2008]
    • In: Leenes R., Schallaböck J., and Hansen M. (Eds). PRIME white paper (2007). https://www.prime-project.eu/prime_products/whitepaper/ [current June 2008]
    • (2007) PRIME white paper
  • 17
    • 39749199849 scopus 로고    scopus 로고
    • Useful void: the art of forgetting in the age of ubiquitous computing
    • John F. Kennedy School of Government - Harvard University [current June 2008]
    • Mayer-Schönberger V. Useful void: the art of forgetting in the age of ubiquitous computing. Faculty research working papers series no. RWP07-022 (Apr. 2007), John F. Kennedy School of Government - Harvard University. http://ksgnotes1.harvard.edu/Research/wpaper.nsf/rwp/RWP07-022/$File/rwp_07_022_mayer-schoenberger.pdf [current June 2008]
    • (2007) Faculty research working papers series no. RWP07-022
    • Mayer-Schönberger, V.1
  • 19
    • 52949120928 scopus 로고    scopus 로고
    • Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology
    • [current June 2008]
    • Pfitzmann A., and Hansen M. Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology. Working paper v0.31 (Feb. 2008). http://dud.inf.tu-dresden.de/Anon_Terminology.shtml [current June 2008]
    • (2008) Working paper v0.31
    • Pfitzmann, A.1    Hansen, M.2
  • 20
    • 41949104374 scopus 로고    scopus 로고
    • Secure and anonymous electronic commerce: providing legal certainty in open digital systems without compromising anonymity
    • IBM Research Division, Zurich [current June 2008]
    • Pfitzmann B., Waidner M., and Pfitzmann A. Secure and anonymous electronic commerce: providing legal certainty in open digital systems without compromising anonymity. IBM research report RZ 3232 (#93278) 05/22/00 computer science/mathematics (May 2000), IBM Research Division, Zurich. http://www.semper.org/sirene/publ/PWP_00anoEcommerce.ps.gz [current June 2008]
    • (2000) IBM research report RZ 3232 (#93278) 05/22/00 computer science/mathematics
    • Pfitzmann, B.1    Waidner, M.2    Pfitzmann, A.3
  • 21
    • 52949112167 scopus 로고    scopus 로고
    • Using population data systems to target vulnerable population subgroups and individuals: issues and incidents
    • Asher J., Banks D., and Scheuren F.J. (Eds), Springer
    • Seltzer W., and Anderson M. Using population data systems to target vulnerable population subgroups and individuals: issues and incidents. In: Asher J., Banks D., and Scheuren F.J. (Eds). Statistical methods for human rights (2008), Springer 273-328
    • (2008) Statistical methods for human rights , pp. 273-328
    • Seltzer, W.1    Anderson, M.2
  • 22
    • 0018545449 scopus 로고
    • How to share a secret
    • no. 11, p. 612-3
    • Shamir A. How to share a secret. Communications of the ACM vol. 22 (Nov. 1979) no. 11, p. 612-3
    • (1979) Communications of the ACM , vol.22
    • Shamir, A.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.