skip to main content
10.1145/1102486acmconferencesBook PagePublication PagesccsConference Proceedingsconference-collections
DIM '05: Proceedings of the 2005 workshop on Digital identity management
ACM2005 Proceeding
Publisher:
  • Association for Computing Machinery
  • New York
  • NY
  • United States
Conference:
CCS05: 12th ACM Conference on Computer and Communications Security 2005 Fairfax VA USA 11 November 2005
ISBN:
978-1-59593-232-7
Published:
11 November 2005
Sponsors:
Next Conference
October 14 - 18, 2024
Salt Lake City , UT , USA
Bibliometrics
Skip Abstract Section
Abstract

On behalf of the DIM Program Committee, we are very pleased to welcome you to the First ACM Workshop on Digital Identity Management - DIM 2005, held in conjunction with the 12th ACM Conference on Computer and Communications Security, CCS2005.Digital identity management is becoming an integral part of our lives and businesses as more and more of the online interactions in which we participate depend on networked computer systems communicating potentially sensitive identity information across personal, company, and enterprise boundaries. Conversely, the abuse of digital identities (e.g. identity theft, eavesdropping, hacking, profiling, etc.) poses an increasing threat to both our privacy and finances - thereby affecting society's collective confidence in online interactions.The goals of this workshop are to explore the frontier of digital identity management, from theoretical analysis to real-world experience, to share the knowledge obtained to date, and to propose an agenda for further research.The program committee accepted 13 papers, from North America, Europe, and Asia, that cover a variety of topics, including privacy protections, authentication and security, and frameworks. We hope that these proceedings will serve as a valuable reference for security researchers and developers.

Skip Table Of Content Section
SESSION: New basic technologies for DIM
Article
Pseudonym management using mediated identity-based cryptography

Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of ...

Article
Establishing and protecting digital identity in federation systems

We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have built trust among each other and enable sharing of user identity information ...

SESSION: Privacy protection
Article
Privacy and identity management for everyone

The shift from a paper-based to an electronic-based society has dramatically reduced the cost of collecting, storing and processing individuals' personal information. As a result, it is becoming more common for businesses to "profile" individuals in ...

    Article
    Managing privacy preferences for federated identity management

    We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of identity is the important component of this vehicle. Identity management has been recently considered to be a viable solution ...

    Article
    DECIDE: a scheme for decentralized identity escrow

    Anonymity is one of the most controversial issues related to the Internet. It greatly encourages misdeeds such as piracy, defamation, and fraud. However, anonymity is important to protect the privacy of individuals and to support the freedom of speech. ...

    SESSION: DIM security and authentication
    Article
    Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing

    This paper proposes a method of anonymizing e-mail addresses for privacy enforcement in business outsourcing. By means of a cryptographic encoding scheme, the method generates an alias address containing a tracking ID for traceability and revocation. ...

    Article
    Authentication using multiple communication channels

    We discuss an authentication method using multiple communication channels. This method enables on-line service providers to strongly authenticate their users on a non-trusted communication channel (e.g. using a kiosk PC in an Internet café to access the ...

    Article
    An authentication method for interaction between personal servers based on the exchange of addresses

    The sharing of information held on personal servers is becoming widespread, as represented by Weblogs, SNS, etc. In this situation, it is necessary for each personal server to authenticate users autonomously without any special conditions for the site ...

    Article
    Usable presentation of secure pseudonyms

    Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities ...

    SESSION: DIM frameworks
    Article
    Federated identity management for protecting users from ID theft

    Federated identity management is sometimes criticized as exacerbating the problem of online identity theft, based as it is on the idea of connecting together previously separate islands of identity information. This paper explores this conjecture, and ...

    Article
    Privacy enhancing identity management: protection against re-identification and profiling

    User centric identity management will be necessary to protect user's privacy in an electronic society. However, designing such systems is a complex task, as the expectations of the different parties involved in electronic transactions have to be met. In ...

    Article
    A delegation framework for federated identity management

    Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accelerating automation of Web Services on the Internet for users on their behalf ...

    Article
    Access control management in a distributed environment supporting dynamic collaboration

    Ensuring secure and authorized access to remote services and information resources in a dynamic collaborative environment is a challenging task. Two major issues that need to be addressed in this regard are: specification of access control requirements ...

    Contributors
    • Rutgers University-Newark
    • University of Milan
    • Nippon Telegraph and Telephone Corporation
    1. Proceedings of the 2005 workshop on Digital identity management

        Recommendations

        Acceptance Rates

        Overall Acceptance Rate16of34submissions,47%
        YearSubmittedAcceptedRate
        DIM '1318844%
        DIM '1016850%
        Overall341647%