Abstract
Interpersonal relationships are increasingly being managed over digital communication media in general, and by electronic social networks in particular. Thus, digital identity, conceived as a way in which to characterize and recognize people on the Internet, has taken center stage. However, this concept remains vague in many of its aspects, which complicates the definitions of the requirements or goals of digital, remote communication. This work aims to shed light on this topic by sketching a basic conceptual framework, including the terminology that captures the essence of digital identity, to analyze those issues of concern to Internet users regarding recognizing their communication partners, and to propose possible solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
References
Altshuler Y, Aharony N, Pentland A, Elovici Y, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Intell Syst 26(6):22–30
Svensson P (2011) Possible e-mail theft from epsilon slams banks, retailers. USA Today, April, 2011
Wingfield N, Sherr I, Worthen B (2011) Hackers raid Sony videogame network. The wall street Journal, (April, 2011)
Hitchcock JA (2007) Cyberbullies, online predators, and what to do about them. MultiMedia Internet@Schools 14(3):13–15
Wolak J, Finkelhor D, Mitchell KJ, Ybarra ML (2008) Online predators and their victims: Myths, realities, and implications for prevention and treatment. Am Psychol 63(2):111–128
Matthews G (1990) Aristotelian essentialism. Philos Phenomenol Res 50:251262
Windley P (2005) Digital identity. O’Reilly Media, Sebastopol, CA
van den Berg B, Leenes R (2011) Computers, privacy and data protection: an element of choice, Chapter keeping up appearances: audience segregation in social network sites, 1st edn. Springer, Dordrecht, pp 211–231
Farrell R (2010) 8 ways to get fired because of social media. http://www.careerrookie.com/Article/CB-221-8-Ways/. Accessed 8 Feb 2012
Madden K (2011) 12 ways to get fired for Facebook. http://msn.careerbuilder.com/Article/MSN-2349-Workplace-1ssues-12-Ways/. Accessed 8 Feb 2012
Barracuda Labs (2012) Attackers use fake friends to blend into Facebook. http://www.barracudalabs.com/wordpress/index.php/2012/02/02/attackers-use-fake-friends-to-blend-into-facebook/. Accessed 19 Jun 2012
Cooper D, Santesson S, Farrell S, Boeyen S, Housley R, Polk W (2008) Internet X.509 public key infrastructure certificate and certificate revocation list (CRL) Profile. RFC 5280 (Proposed Standard). http://www.ietf.org/rfc/rfc5280.txt. Accessed 19 Jun 2012
Paquin C (2011) U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, Feb 2011
Security Team (2010) IBM Research – Zurich. Specification of the identity mixer cryptographic library (a.k.a. cryptographic protocols of the Identity Mixer library). IBM Technical Report RZ3730 (# 99740), IBM Research, Zurich, April 2010
Brands S (2000) Rethinking public key infrastructures and digital certificates: building in privacy. MIT Press, Cambridge, MA
Lysyanskaya et al. (1999) Pseudonym systems. In: Proceedings of SAC 1999, LNCS, vol 1758. Springer, Berlin, pp 184–199
Bichsel P, Mtiller S, Preiss FS, Sommer D, Verdicchio M (2009) Security and trust through electronic social network-based interactions. In: Workshop on security and privacy in online social networking (SPOSN09), vol 4. IEEE Computer Society Press, Vancouver, Aug 2009, pp 1002–1007
OpenID Consortium (2007) OpenID authentication 2.0. http://openid.net/specs/openid-authentication-2_0.html. Specification
Recordon D, Reed D (2006) OpenID 2.0: a platform for user-centric identity management. In: DIM’06: Proceedings of the second ACM workshop on digital identity management. ACM, New York, pp 11–16
Camenisch J, Lysyanskaya A (2001) Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In: Pfitzmann B (ed) EUROCRYPT’01. LNCS, vol 2045, Springer, Innsbruck, March 2001, pp 93–118
Lysyanskaya A (1999) Pseudonym systems. Master’s thesis. MIT, Cambridge, MA
Camenisch J, Shoup V (2002) Practical verifiable encryption and decryption of discrete logarithms. http://eprint.iacr.org/2002/161. Accessed 19 Jun 2012
Allison A, Currall J, Moss M, Stuart S (2004) Digital identity matters. J Am Soc Inf Sci Technol 56(4):364–372
Cameron K (2005) The laws of identity. http://www.identityblog.com/?page_id=354. Accessed 15 Dec 2011
Pfitzmann A, Hansen M (2010) A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (v0.34). http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf. Accessed 13 Feb 2012
Korolova A, Motwani R, Nabar SU, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM conference on information and knowledge management, CIKM’08, ACM, New York, pp 289–298
Ardagna CA, De Capitani di Vimercati S, Paraboschi S, Pedrini E, Samarati P (2009) An XACML-based privacy-centered access control system. In: WISG’09: proceedings of the first ACM workshop on information security governance, ACM, New York, pp 49–58
Acknowledgements
This work was partially supported by the EC within the 7th Framework Programme, under grant agreement 257129 (PoSecCo), and by the MIUR in the framework of the PRIN project Gatecom. In addition, we thank the reviewers of previous versions of this work for their valuable input.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer Science+Business Media New York
About this chapter
Cite this chapter
Bichsel, P., Camenisch, J., Verdicchio, M. (2013). Recognizing Your Digital Friends. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds) Security and Privacy in Social Networks. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-4139-7_3
Download citation
DOI: https://doi.org/10.1007/978-1-4614-4139-7_3
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-4138-0
Online ISBN: 978-1-4614-4139-7
eBook Packages: Computer ScienceComputer Science (R0)