Skip to main content
Top

2013 | OriginalPaper | Chapter

Recognizing Your Digital Friends

Authors : Patrik Bichsel, Jan Camenisch, Mario Verdicchio

Published in: Security and Privacy in Social Networks

Publisher: Springer New York

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Interpersonal relationships are increasingly being managed over digital communication media in general, and by electronic social networks in particular. Thus, digital identity, conceived as a way in which to characterize and recognize people on the Internet, has taken center stage. However, this concept remains vague in many of its aspects, which complicates the definitions of the requirements or goals of digital, remote communication. This work aims to shed light on this topic by sketching a basic conceptual framework, including the terminology that captures the essence of digital identity, to analyze those issues of concern to Internet users regarding recognizing their communication partners, and to propose possible solutions.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30CrossRef Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30CrossRef
2.
go back to reference Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011 Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011
3.
go back to reference Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011) Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011)
4.
go back to reference Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15 Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15
5.
go back to reference Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128CrossRef Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128CrossRef
6.
go back to reference Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262CrossRef Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262CrossRef
7.
go back to reference Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CA Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CA
8.
go back to reference van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231 van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231
12.
go back to reference Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://www.ietf.org/rfc/rfc5280.txt. Accessed 19 Jun 2012 Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://​www.​ietf.​org/​rfc/​rfc5280.​txt. Accessed 19 Jun 2012
13.
go back to reference Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011 Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011
14.
go back to reference Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010 Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010
15.
go back to reference Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA
16.
go back to reference Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199 Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199
17.
go back to reference Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007 Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007
19.
go back to reference Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16 Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16
20.
go back to reference Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118 Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118
21.
go back to reference Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MA Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MA
23.
go back to reference Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372CrossRef Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372CrossRef
26.
go back to reference Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298 Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298
27.
go back to reference Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58 Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58
Metadata
Title
Recognizing Your Digital Friends
Authors
Patrik Bichsel
Jan Camenisch
Mario Verdicchio
Copyright Year
2013
Publisher
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4139-7_3

Premium Partner