Introduction
In this chapter, application scenarios for identity management systems will be discussed in order to identify requirements which should be or already are considered in the design and implementation of privacy-enhancing technologies (PETs).
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2011 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Pötzsch, S., Borcea-Pfitzmann, K., Hansen, M., Liesebach, K., Pfitzmann, A., Steinbrecher, S. (2011). Requirements for Identity Management from the Perspective of Multilateral Interactions. In: Camenisch, J., Leenes, R., Sommer, D. (eds) Digital Privacy. Lecture Notes in Computer Science, vol 6545. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-19050-6_22
Download citation
DOI: https://doi.org/10.1007/978-3-642-19050-6_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-19049-0
Online ISBN: 978-3-642-19050-6
eBook Packages: Computer ScienceComputer Science (R0)