Privacy-ABC Usage Scenarios | SpringerLink
Skip to main content

Privacy-ABC Usage Scenarios

  • Chapter
  • First Online:
Attribute-based Credentials for Trust

Abstract

The decision to employ Privacy-ABC systems and operate them is highly dependent on the business model, requirements and capabilities of the potential adopters. Nevertheless, more knowledge about various use cases of Privacy-ABCs and the problems that can be addressed by them may influence the benefits perceived by the decision makers. In this chapter, we present additional scenarios, beyond the pilots described in Chapters 6 and 7, and discuss their issues that can be resolved by Privacy-ABCs. These scenarios include eIDs, anonymous participation in decisions and polls, use of cloud services within enterprises, bank as Identity Service Provider, and preventing tracking the relying parties.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
JPY 14299
Price includes VAT (Japan)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Ronny Bjones. eParticipation Scenario Reference Guide. Technical Report Tech. Rep., Oct 2010, Microsoft, 2010.

    Google Scholar 

  2. Ronny Bjones, Ioannis Krontiris, Pascal Paillier, and Kai Rannenberg. Integrating anonymous credentials with eids for privacy-respecting online authentication. In Privacy Technologies and Policy, pages 111–124. Springer, 2014.

    Google Scholar 

  3. CA. The adoption of cloud-based services: Increasing confidence through effective security. http://www.datacenterresearch.com/whitepaper/theadoption-of-cloud-based-services-increasingconfidence-4822.html, 2014. Last accessed on 2014-10-20.

  4. Sherman SM Chow, Yi-Jun He, Lucas CK Hui, and Siu Ming Yiu. Spice–simple privacy-preserving identity-management for cloud environment. In Applied Cryptography and Network Security, pages 526–543. Springer, 2012.

    Google Scholar 

  5. Rolf Harms and Michael Yamartino. The economics of the cloud. Microsoft whitepaper, Microsoft Corporation, 2010. Last accessed on 12.01.13.

    Google Scholar 

  6. Information Cards Foundation. Information cards.: Information cards foundation. http://informationcard.net/.

  7. Ingo Naumann and Giles Hogben. Privacy features of european eid card specifications. Network Security, 2008(8):9–13, 2008.

    Google Scholar 

  8. Organization for the Advancement of Structured Information Standards(OASIS). extensible access control markup language (xacml) version 2.0, 2005.

    Google Scholar 

  9. Andreas Pfitzmann and Marit Hansen. A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http://dud.inf.tu-dresden.de/literatur/Anon_Terminology_v0.34.pdf, 2010. Last accessed on 2014-11-08.

  10. Latanya Sweeney. k-anonymity: A model for protecting privacy. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10(05):557–570, 2002.

    Google Scholar 

  11. Harald Zwingelberg and Jan Schallab¨ock. The Proposal for a Regulation on Electronic Identification and Trust Services under a Privacy and ABC4Trust Perspective. Deliverable H2.4, The ABC4Trust EU Project, 2013. Available at http://abc4trust.eu/download/ABC4Trust-H2.4_Privacy_Perspective_on_the_eIDAS_regulation.pdf, Last accessed on 2014-11-08.

  12. Harald Zwingelberg. Necessary Processing of Personal Data: The Need-to-Know Principle and Processing Data from the New German Identity Card. In Privacy and Identity Management for Life, pages 151–163. Springer, 2011.

    Google Scholar 

Download references

Acknowledgement

Acknowledgements We would like to thank Norbert Gӧtze, Eva Schlehahn, Daniel Deibler and Ronny Bjones for comments, input and helpful discussions in relation to this chapter.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Joerg Abendroth .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Abendroth, J. et al. (2015). Privacy-ABC Usage Scenarios. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds) Attribute-based Credentials for Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-14439-9_10

Download citation

Publish with us

Policies and ethics