메뉴 건너뛰기




Volumn 68, Issue , 2007, Pages 133-142

A privacy enhancing mechanism based on pseudonyms for identity protection in location-based services

Author keywords

Hash function; Identity management; Location based services; Privacy; Pseudonyms; Security; Telecommunication services

Indexed keywords

APPLICATION PROVIDERS; IDENTITY MANAGEMENT; IDENTITY PROTECTION; LOCATION BASED; LOCATION DATA; MEMORY CAPABILITIES; MOBILE APPLICATIONS; MOBILE BUSINESS; MOBILE MARKETS; NETWORK OPERATOR; NETWORK SERVICES; NOVEL APPLICATIONS; PROCESSING POWER; PSEUDONYMS; SECURITY; SENSITIVE DATAS; SYSTEM ARCHITECTURES; TRANSFER RATES; USERS ACCESS;

EID: 84871207106     PISSN: 14451336     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Article
Times cited : (10)

References (26)
  • 1
    • 35048891868 scopus 로고    scopus 로고
    • Keying Hash Functions for Message Authentication
    • of Lecture Notes in Computer Science, Springer-Verlag,1996
    • Bellare M., Canetti R. & Krawczyk H. (1996), Keying Hash Functions for Message Authentication, In Koblitz, N., ed.: Advances in Cryptology CRYPTO 96, Volume 1109 of Lecture Notes in Computer Science, Springer-Verlag,1996.
    • (1996) Koblitz, N., ed.: Advances in Cryptology CRYPTO 96 , vol.1109
    • Bellare, M.1    Canetti, R.2    Krawczyk, H.3
  • 3
    • 84871200813 scopus 로고    scopus 로고
    • Analysis of Privacy Protection Technologies
    • CWA 15263, Privacy Management Systems (PMS) and Identity Management systems (IMS), the Drivers thereof and the need for standardization, European Committee for Standardization (CEN), Brussels, 2005
    • CWA 15263 (2005), Analysis of Privacy Protection Technologies, Privacy- Enhancing Technologies (PET), Privacy Management Systems (PMS) and Identity Management systems (IMS), the Drivers thereof and the need for standardization, European Committee for Standardization (CEN), Brussels, 2005.
    • (2005) Privacy- Enhancing Technologies (PET)
  • 5
    • 0003187764 scopus 로고
    • Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data,23 November
    • Directive 95/46/EC of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data,23 November 1995, Official Journal of the European Communities L 281 p. 31.
    • (1995) Official Journal of the European Communities , vol.L281 , pp. 31
  • 6
    • 24944574585 scopus 로고    scopus 로고
    • Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications),12 July
    • Directive 2002/58/EC of the European Parliament and of the Council concerning the processing of personal data and the protection of privacy in the electronic communications sector (Directive on privacy and electronic communications),12 July 2002, Official Journal of the European Communities L 201/37.
    • (2002) Official Journal of the European Communities , vol.L201 , pp. 37
  • 7
    • 0013176783 scopus 로고    scopus 로고
    • IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms, Springer Scientific Publishers
    • LNCS 1958, May, ISBN 3-540-42142-4
    • Fischer-Hübner S., IT-Security and Privacy-Design and Use of Privacy-Enhancing Security Mechanisms, Springer Scientific Publishers, Lecture Notes of Computer Science, LNCS 1958, May 2001, ISBN 3-540-42142-4.
    • (2001) Lecture Notes of Computer Science
    • Fischer-Hübner, S.1
  • 8
    • 85018204196 scopus 로고    scopus 로고
    • Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking
    • Applications, and Services (MobiSys), San Francisco, USA
    • Gruteser, M. & Grunwald, D. (2003), Anonymous Usage of Location-Based Services Through Spatial and Temporal Cloaking, in Proceedings of The First ACM/USENIX International Conference on Mobile Systems, Applications, and Services (MobiSys), San Francisco, USA, pp. 31-42.
    • (2003) Proceedings of The First ACM/USENIX International Conference on Mobile Systems , pp. 31-42
    • Gruteser, M.1    Grunwald, D.2
  • 9
    • 84871218479 scopus 로고    scopus 로고
    • A Privacy Enhancement Mechanism for Location Based Service Architectures using Transaction Pseudonyms
    • Jorns, O., Jung, O., Gross, J. & Bessler, S., A Privacy Enhancement Mechanism for Location Based Service Architectures using Transaction Pseudonyms, TrustBus'05, Copenhagen, Denmark, 2005.
    • (2005) TrustBus'05, Copenhagen, Denmark
    • Jorns, O.1    Jung, O.2    Gross, J.3    Bessler, S.4
  • 13
    • 24644486618 scopus 로고    scopus 로고
    • Privacy for Profitable Location Based Services
    • Conference on Security in Pervasive Computing, Lecture Notes in Computer Science LNCS 3450, Springer, Berlin, Germany
    • Kölsch T., Fritsch L., Hohlweiss M. & Kesdogan D.:Privacy for Profitable Location Based Services, Proceedings of the 2nd Intl. Conference on Security in Pervasive Computing, Lecture Notes in Computer Science (LNCS 3450, pp.164-179), Springer, Berlin, Germany, 2005.
    • (2005) Proceedings of the 2nd Intl , pp. 164-179
    • Kölsch, T.1    Fritsch, L.2    Hohlweiss, M.3    Kesdogan, D.4
  • 14
    • 0019634370 scopus 로고
    • Password Authentication with Insecure Communication
    • Lamport L.: Password Authentication with Insecure Communication, Communications of the ACM, vol. 24(11), 1981, pp. 770-772.
    • (1981) Communications of the ACM , vol.24 , Issue.11 , pp. 770-772
    • Lamport, L.1
  • 15
    • 84871238905 scopus 로고    scopus 로고
    • National Institute of Standards and Technology: Secure hash standard (SHS)
    • National Institute of Standards and Technology: Secure hash standard (SHS). Federal Information Processing Standards Publication 180-2, 2002.
    • (2002) Federal Information Processing Standards Publication , vol.180 , Issue.2
  • 16
    • 84871204357 scopus 로고    scopus 로고
    • Enforcement and Management Requirements
    • OMA (Open Mobile Alliance), Policy Evaluation, 12. June
    • OMA (Open Mobile Alliance), Policy Evaluation, Enforcement and Management Requirements, Candidate V1.0, 12. June 2005.
    • (2005) Candidate , vol.1
  • 19
    • 84871199453 scopus 로고    scopus 로고
    • The Law is Not Enough: Legislation and Privacy Enhancing Technology for Location-Aware Computing
    • Mobile-HCI 2004, Glasgow, Scotland
    • Price Blane A., The Law is Not Enough: Legislation and Privacy Enhancing Technology for Location-Aware Computing, Workshop on Location Systems Privacy and Control, Mobile-HCI 2004, Glasgow, Scotland, 2004.
    • (2004) Workshop on Location Systems Privacy and Control
    • Blane, A.P.1
  • 21
    • 19944371002 scopus 로고    scopus 로고
    • A Document Format for Expressing Privacy Preferences for Location Information
    • draft-ietf-geopriv-policy-08
    • Schulzrinne H., Tschofenig H., Morris J., Cuellar J.& Polk J., A Document Format for Expressing Privacy Preferences for Location Information, Internet-Draft, draft-ietf-geopriv-policy-08, 2006.
    • (2006) Internet-Draft
    • Schulzrinne, H.1    Tschofenig, H.2    Morris, J.3    Cuellar, J.4    Polk, J.5
  • 22
    • 1442278934 scopus 로고    scopus 로고
    • Location-Based Services:Models for Strategy Development in MCommerce
    • Technology Management for Reshaping the World (PICMET'03), Portland, Oregon, USA, 2003
    • Unni R., & Harmon R., (2003), Location-Based Services:Models for Strategy Development in MCommerce, in Proceedings of the 2003 Management of Engineering and Technology, Technology Management for Reshaping the World (PICMET'03), Portland, Oregon, USA, 2003.
    • (2003) Proceedings of the 2003 Management of Engineering and Technology
    • Unni, R.1    Harmon, R.2
  • 23
    • 0001853125 scopus 로고
    • The Computer for the Twenty-First Century
    • September 1991
    • Weiser M. (1991), The Computer for the Twenty-First Century, Scientific American, September 1991, pp. 94 - 100.
    • (1991) Scientific American , pp. 94-100
    • Weiser, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.