You are here: Resources > FIDIS Deliverables > Mobility and Identity > D11.1: Mobility and Identity > 

D11.1: Collection of Topics and Clusters of Mobility and Identity – Towards a Taxonomy of Mobility and Identity

Prototype  Title:
CONCLUSION AND OUTLOOK
 Key Terms & Glossary

 

Conclusion and Outlook

This chapter describes the interplay of privacy with the delegation of rights by means of credentials, extending the concepts described in FIDIS deliverable D3.3. We discovered that such a delegation with today’s identity management systems requires a delegation of a user’s secret which means sharing personal attributes and credentials with others. It follows that a user will lose control of his identity and consequently of his privacy.

 

Freiburg University will extend idemix in order to protect delegated credentials from misuse and tracing back to the user by an access control on delegated, anonymous credentials which focuses on the privacy interests of the user. We will further compare our approach with trust-building measures such as obligations (Hilty, M., Basin, D. and Pretschner, A., 2005), user-controlled access control on disclosed attributes at service’s side (Hohl, A. and Zugenmaier, A., 2005) and a verifiable reporting mechanism relating to the enforcement of privacy policies (Karjoth, G., Schunter, M. and Waidner, M., 2003).

 

Furthermore, the PRIME application prototype is introduced, as a state of the art application scenario for privacy-respecting mobile applications 

 

Prototype  fidis-wp11-del11.1.mobility_and_identity_03.sxw  Key Terms & Glossary
Denis Royer 48 / 58