IDENTITY AND PRIVACY

被引:0
作者
Sonntag, Michael [1 ]
机构
[1] Johannes Kepler Univ Linz, Altenbergerstr 69, A-4040 Linz, Austria
来源
DIGITALIZED ECONOMY, SOCIETY AND INFORMATION MANAGEMENT (IDIMT-2020) | 2020年 / 49卷
关键词
Identity; security; privacy; proof of identity; AUTHENTICATION; RECOGNITION;
D O I
暂无
中图分类号
F [经济];
学科分类号
02 ;
摘要
Security depends on permissions, which themselves depend on the identification of the person. This is contrary to another aim in IT security: privacy. This paper investigates the aspect of controllability of identification, i.e. whether the person to be identified can prevent others from doing this, and/or restrict the information disclosed to them to what the person provides her/himself A method to "sign" stored messages, like forum posts, is presented, where authors can later on, for a self-determined time, prove identity (and therefore authorship) to interested parties and then disclose whatever information about them they desire.
引用
收藏
页码:315 / 324
页数:10
相关论文
共 10 条
[1]  
Asonov D, 2004, P IEEE S SECUR PRIV, P3
[2]  
Charette R. N., 2011, IEEE SPECTRUM
[3]  
Chaum D., 2000, P WORKSH THEOR APPL, P127
[4]  
Fancourt C, 2005, LECT NOTES COMPUT SC, V3546, P1
[5]   A survey on 3D mask presentation attack detection and countermeasures [J].
Jia, Shan ;
Guo, Guodong ;
Xu, Zhengquan .
PATTERN RECOGNITION, 2020, 98
[6]   Smartphone-Based Gait Recognition: From Authentication to Imitation [J].
Muaaz, Muhammad ;
Mayrhofer, Rene .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (11) :3209-3221
[7]  
Pollard M., 2020, EVEN MASK WEARERS CA
[8]  
Prabhakar S., 2003, IEEE Security & Privacy, V1, P33, DOI 10.1109/MSECP.2003.1193209
[9]   MasterPrint: Exploring the Vulnerability of Partial Fingerprint-Based Authentication Systems [J].
Roy, Aditi ;
Memon, Nasir ;
Ross, Arun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (09) :2013-2025
[10]  
Thummel M., IEEE INT C AUT UNPUB