Pseudonym Technology for E-Service

Download
  1. (PDF, 456 KB)
AuthorSearch for: ; Search for: ; Search for:
TypeArticle
ConferencePrivacy Protection for E-Services, published by Idea Group Inc, 2006
Subjectpseudonym; pseudonym technology; anonymity; privacy; privacy protection; service; e-service; web service
AbstractPseudonym technology is attracting more and more attention and, together with privacy violations, is becoming a major issue in various e-services. Current e-service systems make personal data collection very easy and efficient through integration, interconnection, and data mining technologies since they use the user's real identity. Pseudonym technology with unlinkability, anonymity, and accountability can give the user the ability to control the collection, retention, and distribution of his personal information. This chapter explores the challenges, issues, and solutions associated with pseudonym technology for privacy protection in e-services. To have a better understanding of how the pseudonym technology provides privacy protection in e-services, we describe a general pseudonym system architecture, discuss its relationships with other privacy technologies, and summarize its requirements. Based on the requirements, we review, analyze, and compare a number of existing pseudonym technologies. We then give an example of a pseudonym practice - e-wallet for e-services and discuss current issues.
Publication date
LanguageEnglish
AffiliationNRC Institute for Information Technology; National Research Council Canada
Peer reviewedNo
NRC number48269
NPARC number5763404
Export citationExport as RIS
Report a correctionReport a correction
Record identifier1a7268ce-1abd-40ad-a9fc-ccad6badb586
Record created2009-03-29
Record modified2016-05-09
Bookmark and share
  • Share this page with Facebook (Opens in a new window)
  • Share this page with Twitter (Opens in a new window)
  • Share this page with Google+ (Opens in a new window)
  • Share this page with Delicious (Opens in a new window)