Skip to main content

Multilateral Security: Enabling Technologies and Their Evaluation

  • Conference paper
Emerging Trends in Information and Communication Security (ETRICS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 3995))

Abstract

First, multilateral security and its potential are introduced. Then protection goals as well as their synergies and interferences are described. After pointing out some basic facts about security technology in general, a structured overview of technologies for multilateral security is given. An evaluation of the maturity and effectiveness of these technologies shows that some should be applied immediately, while others need quite a bit of further research and development. Finally, a vision for the future is given.

Part of this work has been published in G. Müller, K. Rannenberg (Eds.): Multilateral Security in Communications, Addison-Wesley 1999; R. Wilhelm (Ed.): Informatics. 10 Years Back. 10 Years Ahead; LNCS 2000, pp. 50-62, 2001.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Asokan, N., Janson, P.A., Steiner, M., Waidner, M.: The State of the Art in Electronic Payment Systems. Computer 30(9), 28–35 (1997)

    Article  Google Scholar 

  2. Anderson, R., Needham, R., Shamir, A.: The Steganographic File System. In: Aucsmith, D. (ed.) IH 1998. LNCS, vol. 1525, pp. 73–82. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  3. Asokan, N., Schunter, M., Waidner, M.: Optimistic Protocols for Fair Exchange. In: 4th ACM Conference on Computer and Communications Security, Zürich, pp. 6-17 (April 1997)

    Google Scholar 

  4. Baum-Waidner, B.: Ein Service zur Haftungsverteilung für kompromittierte digitale Signaturen. Verläßliche IT-Systeme, GI-Fachtagung VIS 1999, pp. 203–223, DuD Fachbeiträge, Vieweg, Braunschweig, (1999)

    Google Scholar 

  5. Bürk, H., Pfitzmann, A.: Value Exchange Systems Enabling Security and Unobservability. Computers & Security 9(8), 715–721 (1990)

    Article  Google Scholar 

  6. Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  7. Chaum, D.: Security without Identification: Transaction Systems to make Big Brother Obsolete. Communications of the ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  8. Chaum, D.: Privacy Protected Payments - Unconditional Payer and/or Payee Untraceability. In: SMART CARD 2000: The Future of IC Cards, Proc. of the IFIP WG 11.6 Intern. Conference, Laxenburg (Austria), 1987, pp. 69–93. North-Holland, Amsterdam (1989)

    Google Scholar 

  9. Chaum, D.: Showing credentials without identification: Transferring signatures between unconditionally unlinkable pseudonyms. In: Seberry, J., Pieprzyk, J.P. (eds.) AUSCRYPT 1990. LNCS, vol. 453, pp. 246–264. Springer, Heidelberg (1990)

    Google Scholar 

  10. Chaum, D.: Achieving Electronic Privacy. Scientific American, 96–101(August 1992)

    Google Scholar 

  11. Cooper, D.A., Birman, K.P.: Preserving Privacy in a Network of Mobile Computers. In: 1995 IEEE Symposium on Research in Security and Privacy, pp. 26–38. IEEE Computer Society Press, Los Alamitos (1995)

    Google Scholar 

  12. Canadian System Security Centre; Communications Security Establishment; Government of Canada: The Canadian Trusted Computer Product Evaluation Criteria; Version 3.0e (April 1992)

    Google Scholar 

  13. Department of Defense Standard: Department of Defense Trusted Computer System Evaluation Criteria; (December 1985) DOD 5200.28-STD, Supersedes CSC-STD-001-83, dtd 15 August 1983, Library No. S225,711

    Google Scholar 

  14. Federrath, H., Jerichow, A., Pfitzmann, A.: Mixes in mobile communication systems: Location management with privacy. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 121–135. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  15. Goldschlag, D., Reed, M., Syverson, P.: Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM 42(2), 39–41 (1999)

    Article  Google Scholar 

  16. European Communities - Commission: ITSEC: Information Technology Security Evaluation Criteria; (Provisional Harmonised Criteria, Version 1.2, 28 June 1991) Office for Official Publications of the European Communities, Luxembourg (1991) (ISBN 92-826-3004-8)

    Google Scholar 

  17. Jerichow, A., Müller, J., Pfitzmann, A., Pfitzmann, B., Waidner, M.: Real-Time Mixes: A Bandwidth-Efficient Anonymity Protocol. IEEE Journal on Selected Areas in Communications 16(4), 495–509 (1998)

    Article  Google Scholar 

  18. Pfitzmann, A., Hansen, M.: Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology, http://dud.inf.tu-dresden.de/Anon_Terminology.shtml

  19. Pfitzmann, A.: Biometrie – wie einsetzen und wie nicht? Zum Umgang mit Sicherheitsproblemen von Biometrie und Sicherheits- und Datenschutzproblemen durch Biometrie; digma, Zeitschrift für Datenrecht und Informationssicherheit, Schulthess 5(4), 154–157 (2005)

    Google Scholar 

  20. Pfitzmann, A., Waidner, M.: Networks without user observability. Computers & Security 6(2), 158–166 (1987)

    Article  Google Scholar 

  21. Pfitzmann, A., Pfitzmann, B., Schunter, M., Waidner, M.: Trustworthy User Devices. In: Müller, G., Rannenberg, K. (eds.) Multilateral Security in Communications, pp. 137–156. Addison-Wesley, Reading (1999)

    Google Scholar 

  22. Pfitzmann, A., Schill, A., Westfeld, A., Wicke, G., Wolf, G., Zöllner, J.: A java-based distributed platform for multilateral security. In: Lamersdorf, W., Merz, M. (eds.) TREC 1998. LNCS, vol. 1402, pp. 52–64. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  23. Reiter, M.K., Rubin, A.D.: Anonymous Web Transactions with Crowds. Communications of the ACM 42(2), 32–38 (1999)

    Article  Google Scholar 

  24. Voydock, V.L., Kent, S.T.: Security Mechanisms in High-Level Network Protocols. ACM Computing Surveys 15(2), 135–171 (1983)

    Article  MathSciNet  Google Scholar 

  25. Wolf, G., Pfitzmann, A.: Properties of protection goals and their integration into a user interface. Computer Networks 32, 685–699 (2000)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Pfitzmann, A. (2006). Multilateral Security: Enabling Technologies and Their Evaluation. In: Müller, G. (eds) Emerging Trends in Information and Communication Security. ETRICS 2006. Lecture Notes in Computer Science, vol 3995. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11766155_1

Download citation

  • DOI: https://doi.org/10.1007/11766155_1

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-34640-1

  • Online ISBN: 978-3-540-34642-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics