Privacy and identity management

M Hansen, A Schwartz, A Cooper�- IEEE Security & Privacy, 2008 - ieeexplore.ieee.org
… protect the privacy of participants in an identity management … , the relationship between
identity management and privacy is … a particular identity management system protects privacy in …

Privacy and identity management for everyone

J Camenisch, A Shelat, D Sommer…�- …�on Digital identity�…, 2005 - dl.acm.org
private customer data, the customer, rather than the firm, bears the economic consequences
(ie, identity theft, invasion of privacy… adopt better privacy and identity management measures…

Privacy, identity and security

BJ Goold�- Security and Human Rights', Ben Goold & Liora�…, 2007 - papers.ssrn.com
… security, surveillance, privacy and identity will be explored, … privacy—and the legal frameworks
that aim to protect privacy … to establish the ‘categorical identity’ as the primary means by …

Privacy-enhancing identity management

M Hansen, P Berlich, J Camenisch, S Clau�…�- …�security technical report, 2004 - Elsevier
… We describe the components of a proposed privacy and identity management architecture
(… a PIM (Privacy and Identity Management) Console component on top of the Identity Control …

Privacy, identity, databases

S Karas�- Am. UL Rev., 2002 - HeinOnline
… a legal definition of privacy that … privacy law. Through an exploration of the Supreme Court
jurisprudence, this Article finds that privacy law protects only information that expresses identity

Consumers' protection of online privacy and identity

GR Milne, AJ Rohm, S Bahl�- Journal of Consumer Affairs, 2004 - Wiley Online Library
… relationship between privacy atti… privacy invasion and identity theft. In the second section,
we describe three surveys of consumers’ online behaviors related to online privacy and identity

Usability and privacy in identity management architectures

A Josang, M AlZomai, S Suriadi�- …�Security Workshop (Privacy�…, 2007 - eprints.qut.edu.au
privacy aspects of identity management solutions. We will show that some identity models
naturally provide better usability and privacy … We describe a usercentric approach to identity

[BOOK][B] Privacy and identity management for life

J Camenisch, S Fischer-H�bner, K Rannenberg - 2011 - books.google.com
… PrimeLife has been building on the momentum created and the results achieved by PRIME to
address emerging challenges in the areas of privacy and identity management and really bring�…

[BOOK][B] Lessons from the identity trail: Anonymity, privacy and identity in a networked society

IR Kerr, VM Steeves, C Lucock - 2009 - books.google.com
… produced by ID Trail, is the outcome of two international workshops on privacy, identity,
and … These and numerous other highly talented ID Trail student collaborators have made …

'I make the rules on my Wall': Privacy and identity management practices on Facebook

M Georgalou�- Discourse & Communication, 2016 - journals.sagepub.com
… Do they deliberately exclude any information because of privacy concerns? Do they leave
it … : (1) identity performance on Facebook varies according to our audience, and (2) privacy