Identity and Location

  • Dieter Gollmann
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3957)


In some instances, it may be possible to protect access to a user’s personal data by authorising the return addresses replies pertinent to that user are being sent to, rather than authenticating the principal making the request. This relationship between a user’s identity and authorised locations can offer a new design dimension when trying to improve privacy protection.


Access Control Security Policy User Identity Access Control Policy Return Address 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Aura, T., Roe, M., Arkko, J.: Security of Internet location management. In: Proceedings of the 18th Annual Computer Security Applications Conference, pp. 78–87 (December 2002)Google Scholar
  2. 2.
    Ellison, C.M., Frantz, B., Lampson, B., Rivest, R., Thomas, B.M., Ylonen, T.: SPKI Certificate Theory, RFC 2693 (September 1999)Google Scholar
  3. 3.
    Feigenbaum, J.: Overview of the AT&T Labs trust-management project. In: Christianson, B., Crispo, B., Harbison, W.S., Roe, M. (eds.) Security Protocols 1998. LNCS, vol. 1550, pp. 45–50. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  4. 4.
    Gollmann, D.: Mergers and principals. In: Christianson, B., et al. (eds.) Security Protocols 2000. LNCS, vol. 2133, pp. 5–13. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    La Macchia, B.A., Lange, S., Lyons, M., Martin, R., Price, K.T.: .NET Framework Security. Addison-Wesley Professional, Boston (2002)Google Scholar
  6. 6.
    Lampson, B., Abadi, M., Burrows, M., Wobber, E.: Authentication in distributed systems: Theory and practice. ACM Transactions on Computer Systems 10(4), 265–310 (1992)CrossRefGoogle Scholar
  7. 7.
    Sterne, D.F.: On the buzzword “Security Policy”. In: Proceedings of the 1991 IEEE Symposium on Research in Security and Privacy, pp. 219–230 (1991)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2006

Authors and Affiliations

  • Dieter Gollmann
    • 1
  1. 1.TU Hamburg-HarburgHamburgGermany

Personalised recommendations