2001
DOI: 10.1007/3-540-44702-4_9
|View full text |Cite
|
Sign up to set email alerts
|

Identity Management Based on P3P

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
8
0
1

Year Published

2003
2003
2006
2006

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 4 publications
1
8
0
1
Order By: Relevance
“…Identity managers [Jendricke and Gerd tom Markotten 2000;Clauß and Köhntopp 2001;Berthold and Köhntopp 2001] are envisaged high-level mechanisms that assist users in managing their privacy online. They are based on some underlying anonymous communication infrastructure, like the one that was described in this article.…”
Section: Summary and Discussionmentioning
confidence: 99%
“…Identity managers [Jendricke and Gerd tom Markotten 2000;Clauß and Köhntopp 2001;Berthold and Köhntopp 2001] are envisaged high-level mechanisms that assist users in managing their privacy online. They are based on some underlying anonymous communication infrastructure, like the one that was described in this article.…”
Section: Summary and Discussionmentioning
confidence: 99%
“…The importance of management is concluded in validating established profiles, and rights in the relations (Casassa et al, 2002). The information can be used in process related with identity management (Koch and Wörndl, 2001;Berthold and Köhntopp, 2001) or security mechanisms (Clifford, 1995).…”
Section: Application Of Genuine Identity In E-commercementioning
confidence: 99%
“…Identity management system maintains the privacy not only on his/her digital identity, but genuine identity too. Another advantage is the control over digital identities in terms of authenticity, lifecycle and validity (Berthold and Köhntopp, 2001). The main use of GI's information is to create accounts (figure 1).…”
Section: Identity Managementmentioning
confidence: 99%
“…Dazu gibt es verschiedene Ansätze in Wirtschaft und Forschung, die sich dadurch unterscheiden, wie feingranular diese Daten verwaltet werden können, wo diese Daten gespeichert und welche Sicherheitsmechanismen integriert werden. Sie können zudem einen unterschiedlichen Fokus setzen: entweder optimaler Datenschutz(Berthold & Köhntopp 2000) oder die bestmögliche Repräsentation einer Online-Identität(Koch 2002), wobei ein ideales Identitätsmanagementsystem beides vereinen sollte. Im Rahmen des Projektes onefC der Universität Hamburg entsteht ein Identitätsmanagementsystem, welches als Hauptmotivation die Selbstdarstellung der Internetnutzer sieht, jedoch auch großen Wert auf Sicherheitsaspekte legt…”
unclassified