Abstract
Security of the Identity Management system or privacy of the users? Why not both? Privacy-preserving Attribute-based Credentials (Privacy-ABCs) can cope with this dilemma and offer a basis for privacy-respecting Identity Management systems.
This paper explains the distinct features of Privacy-ABCs as implemented in the EU-sponsored ABC4Trust project via example usage scenarios from the ABC4Trust pilot trials. In particular, it aims for a deeper insight from the application perspective on how Privacy-ABCs can support addressing real-life Identity Management requirements while users’ privacy is protected.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
X.509: information technology - open systems interconnection - the directory: public/key and attribute certificate frameworks. http://www.itu.int/rec/T-REC-X.509/en
Openid authentication 2.0, December 2007. http://openid.net/specs/openid-authentication-2_0.html
Assertions and protocols for the OASIS security assertion markup language (saml) v2.0, March 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
Facebook login. https://developers.facebook.com/products/login/
Hardt, D.: Oauth 2.0 authorization protocol, October 2012. http://tools.ietf.org/html/rfc6749
ISO/IEC 2011: ISO/IEC 24760–1:2011 information technology - security techniques - a framework for identity management - part 1: terminology and concepts, 1st edn. 15–12-2011. http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html
Rannenberg, K.: Multilateral security - a concept and examples for balanced security. In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000 (NSPW 2000), pp. 151–162. ACM, New York (2000) [Online]. Available: http://doi.acm.org/10.1145/366173.366208
Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press (2000)
Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)
Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Krontiris, I., Lehmann, A., Neven, G., Dam Nielsen, J., Paquin, C., Preiss, F.-S., Rannenberg, K., Sabouri, A., Stausholm, M.: Architecture for attribute-based credential technologies - final version. In: The ABC4Trust EU Project, Deliverable D2.2 (2014). Available at https://abc4trust.eu/download/Deliverable_D2.2.pdf. Last accessed on 08–11–2014
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 IFIP International Federation for Information Processing
About this paper
Cite this paper
Sabouri, A., Rannenberg, K. (2015). ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life. In: Camenisch, J., Fischer-Hübner, S., Hansen, M. (eds) Privacy and Identity Management for the Future Internet in the Age of Globalisation. Privacy and Identity 2014. IFIP Advances in Information and Communication Technology, vol 457. Springer, Cham. https://doi.org/10.1007/978-3-319-18621-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-18621-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18620-7
Online ISBN: 978-3-319-18621-4
eBook Packages: Computer ScienceComputer Science (R0)