Abstract
First, multilateral security and its potential are introduced. Then protection goals as well as their synergies and interferences are described. After pointing out some basic facts about security technology in general, a structured overview of technologies for multilateral security is given. An evaluation of the maturity and effectiveness of these technologies shows that some should be applied immediately, while others need quite a bit of further research and development. Finally, a vision for the future is given.
Part of this work has been published in G. Müller, K. Rannenberg (Eds.): Multilateral Security in Communications, Addison-Wesley 1999; R. Wilhelm (Ed.): Informatics. 10 Years Back. 10 Years Ahead; LNCS 2000, pp. 50-62, 2001.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The State of the Art in Electronic Payment Systems. Computer 30(9), 28–35 (1997)
Anderson, R., Needham, R., Shamir, A.: The Steganographic File System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 73–82. Springer, Heidelberg (1998)
Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: 4th ACM Conference on Computer and Communications Security, Zürich, pp. 6-17 (April 1997)
Baum-Waidner, B.: Ein Service zur Haftungsverteilung für kompromittierte digitale Signaturen. Verläßliche IT-Systeme, GI-Fachtagung VIS 1999, pp. 203–223, DuD Fachbeiträge, Vieweg, Braunschweig, (1999)
Bürk, H., Pfitzmann, A.: Value Exchange Systems Enabling Security and Unobservability. Computers & Security 9(8), 715–721 (1990)
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Chaum, D.: Security without Identification: Transaction Systems to make Big Brother Obsolete. Communications of the ACM 28(10), 1030–1044 (1985)
Chaum, D.: Privacy Protected Payments - Unconditional Payer and/or Payee Untraceability. In: SMART CARD 2000: The Future of IC Cards, Proc. of the IFIP WG 11.6 Intern. Conference, Laxenburg (Austria), 1987, pp. 69–93. North-Holland, Amsterdam (1989)
Chaum, D.: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. In: Seberry, J., Pieprzyk, J.P. (eds.) AUSCRYPT 1990. LNCS, vol. 453, pp. 246–264. Springer, Heidelberg (1990)
Chaum, D.: Achieving Electronic Privacy. Scientific American, 96–101(August 1992)
Cooper, D.A., Birman, K.P.: Preserving Privacy in a Network of Mobile Computers. In: 1995 IEEE Symposium on Research in Security and Privacy, pp. 26–38. IEEE Computer Society Press, Los Alamitos (1995)
Canadian System Security Centre; Communications Security Establishment; Government of Canada: The Canadian Trusted Computer Product Evaluation Criteria; Version 3.0e (April 1992)
Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria; (December 1985) DOD 5200.28-STD, Supersedes CSC-STD-001-83, dtd 15 August 1983, Library No. S225,711
Federrath, H., Jerichow, A., Pfitzmann, A.: Mixes in mobile communication systems: Location management with privacy. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 121–135. Springer, Heidelberg (1996)
Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), 39–41 (1999)
European Communities - Commission: ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg (1991) (ISBN 92-826-3004-8)
Jerichow, A., Müller, J., Pfitzmann, A., Pfitzmann, B., Waidner, M.: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol. IEEE Journal on Selected Areas in Communications 16(4), 495–509 (1998)
Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology, http://dud.inf.tu-dresden.de/Anon_Terminology.shtml
Pfitzmann, A.: Biometrie – wie einsetzen und wie nicht? Zum Umgang mit Sicherheitsproblemen von Biometrie und Sicherheits- und Datenschutzproblemen durch Biometrie; digma, Zeitschrift für Datenrecht und Informationssicherheit, Schulthess 5(4), 154–157 (2005)
Pfitzmann, A., Waidner, M.: Networks without user observability. Computers & Security 6(2), 158–166 (1987)
Pfitzmann, A., Pfitzmann, B., Schunter, M., Waidner, M.: Trustworthy User Devices. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, pp. 137–156. Addison-Wesley, Reading (1999)
Pfitzmann, A., Schill, A., Westfeld, A., Wicke, G., Wolf, G., Zöllner, J.: A java-based distributed platform for multilateral security. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 52–64. Springer, Heidelberg (1998)
Reiter, M.K., Rubin, A.D.: Anonymous Web Transactions with Crowds. Communications of the ACM 42(2), 32–38 (1999)
Voydock, V.L., Kent, S.T.: Security Mechanisms in High-Level Network Protocols. ACM Computing Surveys 15(2), 135–171 (1983)
Wolf, G., Pfitzmann, A.: Properties of protection goals and their integration into a user interface. Computer Networks 32, 685–699 (2000)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Pfitzmann, A. (2006). Multilateral Security: Enabling Technologies and Their Evaluation. In: Müller, G. (eds) Emerging Trends in Information and Communication Security. ETRICS 2006. Lecture Notes in Computer Science, vol 3995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11766155_1
Download citation
DOI: https://doi.org/10.1007/11766155_1
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-34640-1
Online ISBN: 978-3-540-34642-5
eBook Packages: Computer ScienceComputer Science (R0)