How to Enhance Privacy and Identity Management for Mobile Communities: Approach and User Driven Concepts of the PICOS Project

  • Christian Kahl
  • Katja Böttcher
  • Markus Tschersich
  • Stephan Heim
  • Kai Rannenberg
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 330)


Mobility allows social communities to become a ubiquitous part of our daily lives. However, as users in such communities share huge amounts of personal data and contents, new challenges emerge with regard to privacy and trust. In this paper we motivate the necessity of advanced privacy enhancing concepts, especially for mobile communities and outline the approach of the PICOS project in order to elaborate such concepts. We explicate how we collected mobile community requirements and elaborated adequate concepts to address them. Finally, we conclude with details on how the concepts were prototypically implemented to demonstrate their feasibility, what distinguishes them from existing work, and how we intend to transfer the concepts to practice.


Mobile Communities Privacy Trust Identity Management 


  1. 1.
    Nielsen: Critical Mass - Worldwide State of the Mobile Web. Nielsen Mobile (2008)Google Scholar
  2. 2.
    Nielsen: Global Faces and Networked Places - A Nielsen report on Social Networking’s New Global Footprint. Nielsen (2009)Google Scholar
  3. 3.
    Liesebach, K., Scherner, T.: D2.4 Requirements. Public Deliverable of EU Project PICOS (2008),
  4. 4.
    Hoegg, R., et al.: Overview of business models for Web 2.0 communities. In: Proceedings of Workshop Gemeinschaften in Neuen Medien, pp. 33–49. TUD Press, Dresden (2006)Google Scholar
  5. 5.
    Clavedetscher, C.: Point: User Involvement Key to Success. IEEE Software 15(2), 30, 32 (1998)Google Scholar
  6. 6.
    Rumbaugh, J.: Getting Started: Using Use Cases To Capture Requirements. Object-Oriented Programming Journal 7(5), 8–12 (1994)Google Scholar
  7. 7.
    Holzblatt, K., Beyer, K.R.: Requirements gathering: the human factor. Communications of the ACM 38(5), 31–32 (1995)CrossRefGoogle Scholar
  8. 8.
    Arlinghaus, R., Mehner, T., Cowx, I.G.: Reconciling traditional inland fisheries management and sustainability in industrialized countries, with emphasis on Europe. Fish and Fisheries 3(4), 261–316 (2002)CrossRefGoogle Scholar
  9. 9.
    Pin/Shan Chen, P.: The Entity Relationship Model, Toward a unified View of Data. ACM Transactions on Database Systems 1(1), 9–36 (1976)CrossRefGoogle Scholar
  10. 10.
    Vernadat, F.B.: Enterprise Modeling Languages. In: Proceedings of International Conference on Enterprise Integration Modeling Technology, Torino, Italy (1997)Google Scholar
  11. 11.
    Müller, G., Wohlgemuth, S.: Study on Mobile Identity Management, Public Deliverable of EU Project FIDIS (2005),
  12. 12.
    Hansen, M., Berlich, P., Camenisch, J., Clauß, S., Pfitzmann, A., Waidner, M.: Privacy-Enhancing Identity Management. Information Security Technical Report 9(1), 35–44 (2004)CrossRefGoogle Scholar
  13. 13.
    Chew, M., Balfanz, D., Laurie, B.: Undermining Privacy in Social Networks. In: Web 2.0 Security and Privacy (in conj. with IEEE Symposium on Security and Privacy) (2008)Google Scholar
  14. 14.
    Adu-Oppong, F., Gardiner, C.K., Kapadia, A., Tsang, P.P.: Social Circles: Tackling Privacy in Social Networks. In: Proceedings of the 4th Symposium on Usable Privacy and Security (SOUPS ’08), Pittsburgh, Pennsylvania, July 23-25 (2008)Google Scholar
  15. 15.
    Hiltz, S.R., Passerini, K.: Trust and Privacy Concern Within Social Networking Sites: A comparison of Facebook and MySpace. In: Proceedings of AMCIS 2007 (2007)Google Scholar
  16. 16.
    Boyd, D.M., Ellison, N.B.: Social Network Sites – Definition, History and Scholarship. Journal of Computer-Mediated Communication 13 (2008)Google Scholar
  17. 17.
    Ganglbauer, E., Döbelt, S., Ueberschär, B.: D7.2a First Community Prototype: Lab and Field Test Report. Public Deliverable of EU Project PICOS (2010),

Copyright information

© IFIP International Federation for Information Processing 2010

Authors and Affiliations

  • Christian Kahl
    • 1
  • Katja Böttcher
    • 1
  • Markus Tschersich
    • 1
  • Stephan Heim
    • 1
  • Kai Rannenberg
    • 1
  1. 1.Chair of Mobile Business & Multilateral SecurityGoethe University FrankfurtFrankfurt am MainGermany

Personalised recommendations