Advertisement

Privacy Enhancing Service Architectures

  • Tero Alamäki
  • Margareta Björksten
  • Péter Dornbach
  • Casper Gripenberg
  • Norbert Győrbíró
  • Gábor Márton
  • Zoltán Németh
  • Timo Skyttä
  • Mikko Tarkiainen
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2482)

Abstract

Following from privacy requirements, new architecture solutions for personalized services are expected to emerge. This paper proposes a conceptual framework for designing privacy enabling service architectures, with a special emphasis on the mobile domain. The treatment of the subject is based on the principle of separating identity and profile information. Basic building blocks such as Identity Broker, Profile Broker, Contract Broker and Authenticator are identified and then put together in different ways resulting in variations on the architecture theme.

Keywords

Personalized Service Real Identity True Identity Conceptual Entity Security Assertion Markup Language 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Clarke, Roger: Identified, Anonymous and Pseudonymous Transactions: The Spectrum of Choice. http://www.anu.edu.au/people/Roger.Clarke/DV/UIPP99.html
  2. 2.
  3. 3.
    Goldberg, Ian Avrum: A Pseudonymous Communications Infrastructure for the Internet. Ph.D. Thesis. http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf
  4. 4.
    Pfitzmann, Andreas and Köhntopp, Marit: Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology. Designing Privacy Enhancing Technologies, 2000. LNCS 2009, ISBN 3-540-41724-9.Google Scholar
  5. 5.
    Customer Profile Exchange (CPExchange) Specification. http://www.cpexchange.org/standard/
  6. 6.
    Ackermann, Mark S. and Cranor, Lorrie: Developing for Privacy: Civility Frameworks and Technical Design. CFP 2000. http://www.cfp2000.org/papers/ackerman.pdf
  7. 7.
    Unified Modeling Language. http://www.uml.org
  8. 8.
    Shostack, Adam. Personal communication.Google Scholar
  9. 9.
    Dornbach, Péter and Németh, Zoltán: Privacy Enhancing Profile Disclosure. In this proceedings.Google Scholar
  10. 10.
    Security Assertion Markup Language (SAML). http://xml.coverpages.org/saml.html
  11. 11.
    David L. Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. http://gecko.cs.purdue.edu/gnet/papers/p84-chaum.pdf
  12. 12.
    Markus Jakobsson and Moti Yung: On Assurance Structures for WWW Commerce. http://citeseer.nj.nec.com/jakobsson98assurance.html

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Tero Alamäki
    • 1
  • Margareta Björksten
    • 1
  • Péter Dornbach
    • 1
  • Casper Gripenberg
    • 1
  • Norbert Győrbíró
    • 1
  • Gábor Márton
    • 1
  • Zoltán Németh
    • 1
  • Timo Skyttä
    • 2
  • Mikko Tarkiainen
    • 1
  1. 1.Nokia Research CenterSoftware Technology LaboratoryUSA
  2. 2.Nokia Mobile PhonesUSA

Personalised recommendations