Changes between Version 17 and Version 18 of PrivacyAndBilling


Ignore:
Timestamp:
Oct 1, 2010, 12:36:18 PM (14 years ago)
Author:
ugus
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • PrivacyAndBilling

    v17 v18  
    1111Conventional security architectures are based around the use of security tokens and policies. Security tokens are means of proving an identity of the entity using cryptographic methods in the digital world. Usually a security token consists of machine-readable cryptographic keys (or passwords) and the identity of its owner. Policies are a set of rules that the system has to follow in making administrative decisions. Checking the validity of a user's security token before granting/denying the network access could be an example of such a rule.
    1212
    13 Including the identity of users in security tokens introduces several privacy problems. Users/entities leave their digital identities along with data about their movements and actions within the SENSEI framework architecture. This allows e.g., the resource providers to profile the behavior of their customers. With the growing number of services and information offered in the digital world, the number of situations where there is a need for protecting the privacy of users is increasing. The SENSEI privacy preserving billing solution deals with this problem and provides a solution that is based on purely symmetric cryptography.
     13Depending on the application scenarion, including the identity of users in security tokens may introduce several privacy problems. Users/entities leave their digital identities along with data about their movements and actions within the SENSEI framework architecture. This allows e.g., the resource providers to profile the behavior of their customers. With the growing number of services and information offered in the digital world, the number of situations where there is a need for protecting the privacy of users is increasing. The SENSEI privacy preserving billing solution deals with this problem and provides a solution that is based on purely symmetric cryptography.
    1414
    1515== Deployment Scenario ==