Skip to main content

Recognizing Your Digital Friends

  • Chapter
  • First Online:
Security and Privacy in Social Networks

Abstract

Interpersonal relationships are increasingly being managed over digital communication media in general, and by electronic social networks in particular. Thus, digital identity, conceived as a way in which to characterize and recognize people on the Internet, has taken center stage. However, this concept remains vague in many of its aspects, which complicates the definitions of the requirements or goals of digital, remote communication. This work aims to shed light on this topic by sketching a basic conceptual framework, including the terminology that captures the essence of digital identity, to analyze those issues of concern to Internet users regarding recognizing their communication partners, and to propose possible solutions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    https://about.me/

References

  1. Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30

    Article  Google Scholar 

  2. Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011

    Google Scholar 

  3. Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011)

    Google Scholar 

  4. Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15

    Google Scholar 

  5. Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128

    Article  Google Scholar 

  6. Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262

    Article  Google Scholar 

  7. Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CA

    Google Scholar 

  8. van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231

    Google Scholar 

  9. Farrell R (2010) 8 ways to get fired because of social media. http://www.careerrookie.com/Article/CB-221-8-Ways/. Accessed 8 Feb 2012

  10. Madden K (2011) 12 ways to get fired for Facebook. http://msn.careerbuilder.com/Article/MSN-2349-Workplace-1ssues-12-Ways/. Accessed 8 Feb 2012

  11. Barracuda Labs (2012) Attackers use fake friends to blend into Facebook. http://www.barracudalabs.com/wordpress/index.php/2012/02/02/attackers-use-fake-friends-to-blend-into-facebook/. Accessed 19 Jun 2012

  12. Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://www.ietf.org/rfc/rfc5280.txt. Accessed 19 Jun 2012

  13. Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011

    Google Scholar 

  14. Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010

    Google Scholar 

  15. Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA

    Google Scholar 

  16. Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199

    Google Scholar 

  17. Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007

    Google Scholar 

  18. OpenID Consortium (2007) OpenID authentication 2.0. http://openid.net/specs/openid-authentication-2_0.html. Specification

  19. Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16

    Google Scholar 

  20. Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118

    Google Scholar 

  21. Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MA

    Google Scholar 

  22. Camenisch J, Shoup V (2002) Practical verifiable encryption and decryption of discrete logarithms. http://eprint.iacr.org/2002/161. Accessed 19 Jun 2012

  23. Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372

    Article  Google Scholar 

  24. Cameron K (2005) The laws of identity. http://www.identityblog.com/?page_id=354. Accessed 15 Dec 2011

  25. Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (v0.34). http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf. Accessed 13 Feb 2012

  26. Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298

    Google Scholar 

  27. Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58

    Google Scholar 

Download references

Acknowledgements

This work was partially supported by the EC within the 7th Framework Programme, under grant agreement 257129 (PoSecCo), and by the MIUR in the framework of the PRIN project Gatecom. In addition, we thank the reviewers of previous versions of this work for their valuable input.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrik Bichsel .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer Science+Business Media New York

About this chapter

Cite this chapter

Bichsel, P., Camenisch, J., Verdicchio, M. (2013). Recognizing Your Digital Friends. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds) Security and Privacy in Social Networks. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4139-7_3

Download citation

  • DOI: https://doi.org/10.1007/978-1-4614-4139-7_3

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4614-4138-0

  • Online ISBN: 978-1-4614-4139-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics