Advertisement

ABC4Trust: Protecting Privacy in Identity Management by Bringing Privacy-ABCs into Real-Life

  • Ahmad SabouriEmail author
  • Kai Rannenberg
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 457)

Abstract

Security of the Identity Management system or privacy of the users? Why not both? Privacy-preserving Attribute-based Credentials (Privacy-ABCs) can cope with this dilemma and offer a basis for privacy-respecting Identity Management systems.

This paper explains the distinct features of Privacy-ABCs as implemented in the EU-sponsored ABC4Trust project via example usage scenarios from the ABC4Trust pilot trials. In particular, it aims for a deeper insight from the application perspective on how Privacy-ABCs can support addressing real-life Identity Management requirements while users’ privacy is protected.

Keywords

Service Provider Smart Card Identity Management Access Policy Partial Identity 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    X.509: information technology - open systems interconnection - the directory: public/key and attribute certificate frameworks. http://www.itu.int/rec/T-REC-X.509/en
  2. 2.
    Openid authentication 2.0, December 2007. http://openid.net/specs/openid-authentication-2_0.html
  3. 3.
    Assertions and protocols for the OASIS security assertion markup language (saml) v2.0, March 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf
  4. 4.
  5. 5.
    Hardt, D.: Oauth 2.0 authorization protocol, October 2012. http://tools.ietf.org/html/rfc6749
  6. 6.
    ISO/IEC 2011: ISO/IEC 24760–1:2011 information technology - security techniques - a framework for identity management - part 1: terminology and concepts, 1st edn. 15–12-2011. http://standards.iso.org/ittf/PubliclyAvailableStandards/index.html
  7. 7.
    Rannenberg, K.: Multilateral security - a concept and examples for balanced security. In: Proceedings of the 9th ACM New Security Paradigms Workshop 2000 (NSPW 2000), pp. 151–162. ACM, New York (2000) [Online]. Available: http://doi.acm.org/10.1145/366173.366208
  8. 8.
    Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press (2000)Google Scholar
  9. 9.
    Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security, pp. 21–30. ACM (2002)Google Scholar
  10. 10.
    Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Krontiris, I., Lehmann, A., Neven, G., Dam Nielsen, J., Paquin, C., Preiss, F.-S., Rannenberg, K., Sabouri, A., Stausholm, M.: Architecture for attribute-based credential technologies - final version. In: The ABC4Trust EU Project, Deliverable D2.2 (2014). Available at https://abc4trust.eu/download/Deliverable_D2.2.pdf. Last accessed on 08–11–2014

Copyright information

© IFIP International Federation for Information Processing 2015

Authors and Affiliations

  1. 1.Deutsche Telekom Chair of Mobile Business and Multilateral SecurityGoethe University FrankfurtFrankfurtGermany

Personalised recommendations