Abstract
Following from privacy requirements, new architecture solutions for personalized services are expected to emerge. This paper proposes a conceptual framework for designing privacy enabling service architectures, with a special emphasis on the mobile domain. The treatment of the subject is based on the principle of separating identity and profile information. Basic building blocks such as Identity Broker, Profile Broker, Contract Broker and Authenticator are identified and then put together in different ways resulting in variations on the architecture theme.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Clarke, Roger: Identified, Anonymous and Pseudonymous Transactions: The Spectrum of Choice. http://www.anu.edu.au/people/Roger.Clarke/DV/UIPP99.html
Lance Detweiler & The Theory of Nymity. http://www.geektimes.com/michael/culture/humor/items/Geekish/theoryOfNymity.html
Goldberg, Ian Avrum: A Pseudonymous Communications Infrastructure for the Internet. Ph.D. Thesis. http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf
Pfitzmann, Andreas and Köhntopp, Marit: Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology. Designing Privacy Enhancing Technologies, 2000. LNCS 2009, ISBN 3-540-41724-9.
Customer Profile Exchange (CPExchange) Specification. http://www.cpexchange.org/standard/
Ackermann, Mark S. and Cranor, Lorrie: Developing for Privacy: Civility Frameworks and Technical Design. CFP 2000. http://www.cfp2000.org/papers/ackerman.pdf
Unified Modeling Language. http://www.uml.org
Shostack, Adam. Personal communication.
Dornbach, Péter and Németh, Zoltán: Privacy Enhancing Profile Disclosure. In this proceedings.
Security Assertion Markup Language (SAML). http://xml.coverpages.org/saml.html
David L. Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. http://gecko.cs.purdue.edu/gnet/papers/p84-chaum.pdf
Markus Jakobsson and Moti Yung: On Assurance Structures for WWW Commerce. http://citeseer.nj.nec.com/jakobsson98assurance.html
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2003 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Alamäki, T. et al. (2003). Privacy Enhancing Service Architectures. In: Dingledine, R., Syverson, P. (eds) Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science, vol 2482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36467-6_8
Download citation
DOI: https://doi.org/10.1007/3-540-36467-6_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-00565-0
Online ISBN: 978-3-540-36467-2
eBook Packages: Springer Book Archive