Skip to main content

2013 | OriginalPaper | Buchkapitel

Recognizing Your Digital Friends

verfasst von : Patrik Bichsel, Jan Camenisch, Mario Verdicchio

Erschienen in: Security and Privacy in Social Networks

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Interpersonal relationships are increasingly being managed over digital communication media in general, and by electronic social networks in particular. Thus, digital identity, conceived as a way in which to characterize and recognize people on the Internet, has taken center stage. However, this concept remains vague in many of its aspects, which complicates the definitions of the requirements or goals of digital, remote communication. This work aims to shed light on this topic by sketching a basic conceptual framework, including the terminology that captures the essence of digital identity, to analyze those issues of concern to Internet users regarding recognizing their communication partners, and to propose possible solutions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30CrossRef Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30CrossRef
2.
Zurück zum Zitat Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011 Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011
3.
Zurück zum Zitat Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011) Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011)
4.
Zurück zum Zitat Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15 Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15
5.
Zurück zum Zitat Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128CrossRef Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128CrossRef
6.
Zurück zum Zitat Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262CrossRef Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262CrossRef
7.
Zurück zum Zitat Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CA Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CA
8.
Zurück zum Zitat van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231 van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231
12.
Zurück zum Zitat Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://www.ietf.org/rfc/rfc5280.txt. Accessed 19 Jun 2012 Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://​www.​ietf.​org/​rfc/​rfc5280.​txt. Accessed 19 Jun 2012
13.
Zurück zum Zitat Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011 Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011
14.
Zurück zum Zitat Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010 Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010
15.
Zurück zum Zitat Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA
16.
Zurück zum Zitat Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199 Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199
17.
Zurück zum Zitat Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007 Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007
19.
Zurück zum Zitat Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16 Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16
20.
Zurück zum Zitat Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118 Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118
21.
Zurück zum Zitat Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MA Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MA
23.
Zurück zum Zitat Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372CrossRef Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372CrossRef
26.
Zurück zum Zitat Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298 Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298
27.
Zurück zum Zitat Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58 Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58
Metadaten
Titel
Recognizing Your Digital Friends
verfasst von
Patrik Bichsel
Jan Camenisch
Mario Verdicchio
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4139-7_3