Based on the framework for pseudonyms given in Chap. 7 the model introduced in Chap. 3 is extended by the concept of pseudonymity in this Chapter. The property statements from Sect. 3.3 are interpreted in terms of pseudonyms in Sect. 8.1. The architecture introduced in Sect. 3.4 is extended by reidentification, audit data collection, and audit data processing in Sect. 8.2. Also, the control requirements are extended in Sect. 8.2. The application domain of the architectural model and the attacker model are described in Sect. 8.3. Finally, different architectures and the specific control requirements are given in Sect. 8.4. Most notably, the simplified control requirements for technical purpose binding over organizational purpose binding are explained in Sect. 8.4.1. The various architectures presented in this Chapter are compared in Chap. 9.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 2007 Springer Science+Business Media, LLC
About this chapter
Cite this chapter
(2007). An Architectural Model for Pseudonymous and Secure Authorizations. In: Privacy-Respecting Intrusion Detection. Advances in Information Security, vol 35. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-68254-9_8
Download citation
DOI: https://doi.org/10.1007/978-0-387-68254-9_8
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-34346-4
Online ISBN: 978-0-387-68254-9
eBook Packages: Computer ScienceComputer Science (R0)