- Sponsor:
- sigsac
On behalf of the DIM Program Committee, we are very pleased to welcome you to the First ACM Workshop on Digital Identity Management - DIM 2005, held in conjunction with the 12th ACM Conference on Computer and Communications Security, CCS2005.Digital identity management is becoming an integral part of our lives and businesses as more and more of the online interactions in which we participate depend on networked computer systems communicating potentially sensitive identity information across personal, company, and enterprise boundaries. Conversely, the abuse of digital identities (e.g. identity theft, eavesdropping, hacking, profiling, etc.) poses an increasing threat to both our privacy and finances - thereby affecting society's collective confidence in online interactions.The goals of this workshop are to explore the frontier of digital identity management, from theoretical analysis to real-world experience, to share the knowledge obtained to date, and to propose an agenda for further research.The program committee accepted 13 papers, from North America, Europe, and Asia, that cover a variety of topics, including privacy protections, authentication and security, and frameworks. We hope that these proceedings will serve as a valuable reference for security researchers and developers.
Proceeding Downloads
Pseudonym management using mediated identity-based cryptography
Mobile Location-Based Services (LBS) have raised privacy concerns amongst mobile phone users who may need to supply their identity and location information to untrustworthy third parties in order to access these applications. Widespread acceptance of ...
Establishing and protecting digital identity in federation systems
We develop solutions for the security and privacy of user identity information in a federation. By federation we mean a group of organizations or service providers which have built trust among each other and enable sharing of user identity information ...
Privacy and identity management for everyone
- Jan Camenisch,
- abhi shelat,
- Dieter Sommer,
- Simone Fischer-Hübner,
- Marit Hansen,
- Henry Krasemann,
- Gérard Lacoste,
- Ronald Leenes,
- Jimmy Tseng
The shift from a paper-based to an electronic-based society has dramatically reduced the cost of collecting, storing and processing individuals' personal information. As a result, it is becoming more common for businesses to "profile" individuals in ...
Managing privacy preferences for federated identity management
We have witnessed that the Internet is now a prime vehicle for business, community, and personal interactions. The notion of identity is the important component of this vehicle. Identity management has been recently considered to be a viable solution ...
DECIDE: a scheme for decentralized identity escrow
Anonymity is one of the most controversial issues related to the Internet. It greatly encourages misdeeds such as piracy, defamation, and fraud. However, anonymity is important to protect the privacy of individuals and to support the freedom of speech. ...
Cryptographic alias e-mail addresses for privacy enforcement in business outsourcing
This paper proposes a method of anonymizing e-mail addresses for privacy enforcement in business outsourcing. By means of a cryptographic encoding scheme, the method generates an alias address containing a tracking ID for traceability and revocation. ...
Authentication using multiple communication channels
We discuss an authentication method using multiple communication channels. This method enables on-line service providers to strongly authenticate their users on a non-trusted communication channel (e.g. using a kiosk PC in an Internet café to access the ...
An authentication method for interaction between personal servers based on the exchange of addresses
The sharing of information held on personal servers is becoming widespread, as represented by Weblogs, SNS, etc. In this situation, it is necessary for each personal server to authenticate users autonomously without any special conditions for the site ...
Usable presentation of secure pseudonyms
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities ...
Federated identity management for protecting users from ID theft
Federated identity management is sometimes criticized as exacerbating the problem of online identity theft, based as it is on the idea of connecting together previously separate islands of identity information. This paper explores this conjecture, and ...
Privacy enhancing identity management: protection against re-identification and profiling
User centric identity management will be necessary to protect user's privacy in an electronic society. However, designing such systems is a complex task, as the expectations of the different parties involved in electronic transactions have to be met. In ...
A delegation framework for federated identity management
Identity federation is a powerful scheme that links accounts of users maintained distinctly by different business partners. The concept of network identity is a driver for accelerating automation of Web Services on the Internet for users on their behalf ...
Access control management in a distributed environment supporting dynamic collaboration
Ensuring secure and authorized access to remote services and information resources in a dynamic collaborative environment is a challenging task. Two major issues that need to be addressed in this regard are: specification of access control requirements ...
- Proceedings of the 2005 workshop on Digital identity management