An eid mechanism built along privacy by design principles using secure elements, pseudonyms and attributes
dc.contributor.author | Pinkas, Denis | |
dc.contributor.editor | Hühnlein, Detlef | |
dc.contributor.editor | Roßnagel, Heiko | |
dc.contributor.editor | Schunck, Christian H. | |
dc.contributor.editor | Talamo, Maurizio | |
dc.date.accessioned | 2017-06-20T11:39:38Z | |
dc.date.available | 2017-06-20T11:39:38Z | |
dc.date.issued | 2016 | |
dc.description.abstract | This eID mechanism has been built taking into consideration Privacy by Design principles. It uses some of the basic principles of the FIDO model (Fast Identification On-line) adding certain constraints and extending the model to push user attributes. It allows a user to open an anonymous account on a server using a random pseudonym and then to push one or more attributes contained in an access token that has been obtained from an Attribute Issuer. In order to prevent the forwarding of an access token between collaborative users, a Secure Element must be used. That Secure Element shall conform to specific requirements, e.g. defined using a Protection Profile. This eID mechanism will be worldwide usable as soon as the providers of such Secure Elements publish information that can verify the genuineness of these secure elements. | |
dc.identifier.isbn | 978-3-88579-658-9 | |
dc.identifier.pissn | 1617-5468 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-264 | |
dc.title | An eid mechanism built along privacy by design principles using secure elements, pseudonyms and attributes | |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 104 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 93 | |
gi.conference.date | 13.-14. October 2016 | |
gi.conference.location | Rome, Italy |
Dateien
Originalbündel
1 - 1 von 1