Skip to main content

Privacy Enhancing Service Architectures

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2482))

Abstract

Following from privacy requirements, new architecture solutions for personalized services are expected to emerge. This paper proposes a conceptual framework for designing privacy enabling service architectures, with a special emphasis on the mobile domain. The treatment of the subject is based on the principle of separating identity and profile information. Basic building blocks such as Identity Broker, Profile Broker, Contract Broker and Authenticator are identified and then put together in different ways resulting in variations on the architecture theme.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Clarke, Roger: Identified, Anonymous and Pseudonymous Transactions: The Spectrum of Choice. http://www.anu.edu.au/people/Roger.Clarke/DV/UIPP99.html

  2. Lance Detweiler & The Theory of Nymity. http://www.geektimes.com/michael/culture/humor/items/Geekish/theoryOfNymity.html

  3. Goldberg, Ian Avrum: A Pseudonymous Communications Infrastructure for the Internet. Ph.D. Thesis. http://www.isaac.cs.berkeley.edu/~iang/thesis-final.pdf

  4. Pfitzmann, Andreas and Köhntopp, Marit: Anonymity, Unobservability, and Pseudonymity: A Proposal for Terminology. Designing Privacy Enhancing Technologies, 2000. LNCS 2009, ISBN 3-540-41724-9.

    Google Scholar 

  5. Customer Profile Exchange (CPExchange) Specification. http://www.cpexchange.org/standard/

  6. Ackermann, Mark S. and Cranor, Lorrie: Developing for Privacy: Civility Frameworks and Technical Design. CFP 2000. http://www.cfp2000.org/papers/ackerman.pdf

  7. Unified Modeling Language. http://www.uml.org

  8. Shostack, Adam. Personal communication.

    Google Scholar 

  9. Dornbach, Péter and Németh, Zoltán: Privacy Enhancing Profile Disclosure. In this proceedings.

    Google Scholar 

  10. Security Assertion Markup Language (SAML). http://xml.coverpages.org/saml.html

  11. David L. Chaum: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. http://gecko.cs.purdue.edu/gnet/papers/p84-chaum.pdf

  12. Markus Jakobsson and Moti Yung: On Assurance Structures for WWW Commerce. http://citeseer.nj.nec.com/jakobsson98assurance.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2003 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Alamäki, T. et al. (2003). Privacy Enhancing Service Architectures. In: Dingledine, R., Syverson, P. (eds) Privacy Enhancing Technologies. PET 2002. Lecture Notes in Computer Science, vol 2482. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-36467-6_8

Download citation

  • DOI: https://doi.org/10.1007/3-540-36467-6_8

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-00565-0

  • Online ISBN: 978-3-540-36467-2

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics