Recognizing Your Digital Friends

Chapter

Abstract

Interpersonal relationships are increasingly being managed over digital communication media in general, and by electronic social networks in particular. Thus, digital identity, conceived as a way in which to characterize and recognize people on the Internet, has taken center stage. However, this concept remains vague in many of its aspects, which complicates the definitions of the requirements or goals of digital, remote communication. This work aims to shed light on this topic by sketching a basic conceptual framework, including the terminology that captures the essence of digital identity, to analyze those issues of concern to Internet users regarding recognizing their communication partners, and to propose possible solutions.

Keywords

Coherence Assure 

Notes

Acknowledgements

This work was partially supported by the EC within the 7th Framework Programme, under grant agreement 257129 (PoSecCo), and by the MIUR in the framework of the PRIN project Gatecom. In addition, we thank the reviewers of previous versions of this work for their valuable input.

References

  1. 1.
    Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30CrossRefGoogle Scholar
  2. 2.
    Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011Google Scholar
  3. 3.
    Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011)Google Scholar
  4. 4.
    Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15Google Scholar
  5. 5.
    Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128CrossRefGoogle Scholar
  6. 6.
    Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262CrossRefGoogle Scholar
  7. 7.
    Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CAGoogle Scholar
  8. 8.
    van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231Google Scholar
  9. 9.
    Farrell R (2010) 8 ways to get fired because of social media. http://www.careerrookie.com/Article/CB-221-8-Ways/. Accessed 8 Feb 2012
  10. 10.
    Madden K (2011) 12 ways to get fired for Facebook. http://msn.careerbuilder.com/Article/MSN-2349-Workplace-1ssues-12-Ways/. Accessed 8 Feb 2012
  11. 11.
    Barracuda Labs (2012) Attackers use fake friends to blend into Facebook. http://www.barracudalabs.com/wordpress/index.php/2012/02/02/attackers-use-fake-friends-to-blend-into-facebook/. Accessed 19 Jun 2012
  12. 12.
    Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://www.ietf.org/rfc/rfc5280.txt. Accessed 19 Jun 2012
  13. 13.
    Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011Google Scholar
  14. 14.
    Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010Google Scholar
  15. 15.
    Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MAGoogle Scholar
  16. 16.
    Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199Google Scholar
  17. 17.
    Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007Google Scholar
  18. 18.
    OpenID Consortium (2007) OpenID authentication 2.0. http://openid.net/specs/openid-authentication-2_0.html. Specification
  19. 19.
    Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16Google Scholar
  20. 20.
    Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118Google Scholar
  21. 21.
    Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MAGoogle Scholar
  22. 22.
    Camenisch J, Shoup V (2002) Practical verifiable encryption and decryption of discrete logarithms. http://eprint.iacr.org/2002/161. Accessed 19 Jun 2012
  23. 23.
    Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372CrossRefGoogle Scholar
  24. 24.
    Cameron K (2005) The laws of identity. http://www.identityblog.com/?page_id=354. Accessed 15 Dec 2011
  25. 25.
    Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (v0.34). http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf. Accessed 13 Feb 2012
  26. 26.
    Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298Google Scholar
  27. 27.
    Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58Google Scholar

Copyright information

© Springer Science+Business Media New York 2013

Authors and Affiliations

  • Patrik Bichsel
    • 1
  • Jan Camenisch
    • 1
  • Mario Verdicchio
    • 2
  1. 1.IBM ResearchZurichSwitzerland
  2. 2.Università degli Studi di BergamoBergamoItaly

Personalised recommendations