Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Trust in PRIME
Karlstad University, Division for Information Technology.
IBM Zurich Research Laboratory, Switzerland.
Hewlett-Packard Laboratories, UK.
Karlstad University, Division for Information Technology.ORCID iD: 0000-0002-6938-4466
Show others and affiliations
2005 (English)In: Proceedings of the 5th IEEE International Symposium on Signal Processing and IT, IEEE conference proceedings, 2005, p. 552-559Conference paper, Published paper (Other academic)
Abstract [en]

The PRIME project develops privacy enhancing identity management systems that allow users in various application areas such as e-commerce to regain control over their personal spheres. This paper introduces the PRIME technical architecture that also includes special trust-enhancing mechanisms, and shows how PRIME technologies can enhance privacy and trust of e-shopping customers. It also discusses the socio-psychological factors and HCI aspects influencing the end user's trust in privacy enhancing identity management, and shows why HCI research, user studies, and socio-psychological research, are necessary efforts to accompany system design.

Place, publisher, year, edition, pages
IEEE conference proceedings, 2005. p. 552-559
National Category
Computer Sciences Information Systems
Research subject
Computer Science; Information Systems
Identifiers
URN: urn:nbn:se:kau:diva-1956DOI: 10.1109/ISSPIT.2005.1577157ISBN: 0-7803-9313-9 (print)OAI: oai:DiVA.org:kau-1956DiVA, id: diva2:5143
Conference
the 5th IEEE International Symposium on Signal Processing and IT, 21-21 Dec. 2005, Athens
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-06-04Bibliographically approved
In thesis
1. Design and Evaluation of Anonymity Solutions for Mobile Networks
Open this publication in new window or tab >>Design and Evaluation of Anonymity Solutions for Mobile Networks
2007 (English)Doctoral thesis, comprehensive summary (Other scientific)
Abstract [en]

Internet and mobile communications have had a profound effect on today's society. New services are constantly being deployed, in which personal data are being processed in return for personally tailored services. While mobile networks lay the groundwork for new innovative services, at the same time they pose numerous privacy challenges. There is the risk that honest citizens participating in mobile communications will have their privacy invaded for "the greater good". We argue that it is highly important that individuals are empowered to retain control over their personal spheres. Thus, the goal of this thesis is to design and evaluate anonymous overlay networks} adapted for mobile networks that allow users to control which information leaves their personal spheres in a mobile communication.

Technically, by using an anonymous overlay network, users can communicate with their communication partners without disclosing their network identities. In this thesis, we propose three different anonymous overlay networks tailored for mobile networks. First, two approaches are proposed for anonymous browsing on the mobile Internet, namely mCrowds and a Tor-based approach. By applying theoretical analysis and\,/\,or practical experiments, we show that these approaches offer an appropriate trade-off between the offered degree of anonymity and performance loss. Second, an anonymous overlay network for use in mobile ad hoc networks - Chameleon - is suggested.

Besides the actual design of these anonymous overlay networks, this thesis provides novel contributions in other essential areas of privacy protection and anonymous communication. First, also non-technical aspects of privacy protection are thoroughly discussed, including legal, social, and user interface aspects. Second, we survey existing metrics for quantifying anonymity and also propose new ideas regarding anonymity metrics. Third, we review and classify existing mechanisms for anonymous communication in mobile ad hoc networks. Lastly, we also propose a cryptographic technique for building up the user base of an anonymous overlay network in a secure and privacy-friendly manner.

Place, publisher, year, edition, pages
Fakulteten för ekonomi, kommunikation och IT, 2007
Series
Karlstad University Studies, ISSN 1403-8099 ; 2007:48
Keywords
privacy, anonymity, anonymous overlay networks, anonymity metrics, pseudonymity, identity management, mobile Internet, location based services, mobile ad hoc networks
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:kau:diva-1282 (URN)978-91-7063-152-8 (ISBN)
Public defence
2008-01-21, Sjöströmssalen, 1B 309, Karlstads universitet, Karlstad, 13:00
Opponent
Supervisors
Available from: 2007-12-19 Created: 2007-12-19 Last updated: 2018-01-12

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records BETA

Fischer-Hübner, SimonePettersson, John Sören

Search in DiVA

By author/editor
Fischer-Hübner, SimonePettersson, John Sören
By organisation
Division for Information Technology
Computer SciencesInformation Systems

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 1057 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf