{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T21:38:17Z","timestamp":1761946697015,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,11]],"date-time":"2005-11-11T00:00:00Z","timestamp":1131667200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,11]]},"DOI":"10.1145\/1102486.1102501","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"84-93","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Privacy enhancing identity management"],"prefix":"10.1145","author":[{"given":"Sebastian","family":"Clau\u03b2","sequence":"first","affiliation":[{"name":"TU Dresden, Dresden, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dogan","family":"Kesdogan","sequence":"additional","affiliation":[{"name":"RWTH Aachen, Aachen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tobias","family":"K\u00f6lsch","sequence":"additional","affiliation":[{"name":"RWTH Aachen, Aachen, Germany"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2005,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"115","volume-title":"Proc. Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009","author":"Berthold O.","year":"2001","unstructured":"O. Berthold , H. Federrath , and S K\u00f6psell . Web mixes : A system for anonymous and unobservable internet access. Designing Privacy Enhancing Technologies . Proc. Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009 , Springer-Verlag, Heidelberg 2001 , pp. 115 -- 129 .]] O. Berthold, H. Federrath, and S K\u00f6psell. Web mixes: A system for anonymous and unobservable internet access. Designing Privacy Enhancing Technologies. Proc. Workshop on Design Issues in Anonymity and Unobservability, LNCS 2009, Springer-Verlag, Heidelberg 2001, pp. 115--129.]]"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586114"},{"key":"e_1_3_2_1_4_1","volume-title":"IBM Research","author":"Camenisch J.","year":"2000","unstructured":"J. Camenisch and A. Lysyanskaya . Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Research Report RZ 3295 (#93341) , IBM Research , November 2000 .]] J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. Research Report RZ 3295 (#93341), IBM Research, November 2000.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"e_1_3_2_1_6_1","series-title":"LNCS","first-page":"241","volume-title":"Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques","author":"Chaum D.","year":"1985","unstructured":"D. Chaum . Showing credentials without identification: Signatures transferred between unconditionally unlinkable pseudonyms . In F. Pichler, editor, Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques , Linz, Austria, April 1985 , Proceedings, volume 219 of LNCS , pages 241 -- 244 , Heidelberg, 1986. Springer Verlag .]] D. Chaum. Showing credentials without identification: Signatures transferred between unconditionally unlinkable pseudonyms. In F. Pichler, editor, Advances in Cryptology - EUROCRYPT '85, Workshop on the Theory and Application of of Cryptographic Techniques, Linz, Austria, April 1985, Proceedings, volume 219 of LNCS, pages 241--244, Heidelberg, 1986. Springer Verlag.]]"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(01)00217-1"},{"key":"e_1_3_2_1_8_1","volume-title":"Privacy-enhancing identity management. The IPTS Report","author":"Clau\u03b2 S.","year":"2002","unstructured":"S. Clau\u03b2 , A. Pfitzmann , M. Hansen , and E. V. Herreweghen . Privacy-enhancing identity management. The IPTS Report , Special Issue : Identity and Privacy :8--16, 2002 .]] S. Clau\u03b2, A. Pfitzmann, M. Hansen, and E. V. Herreweghen. Privacy-enhancing identity management. The IPTS Report, Special Issue: Identity and Privacy:8--16, 2002.]]"},{"key":"e_1_3_2_1_9_1","first-page":"230","volume-title":"Real world patterns of failure in anonymity systems. Information Hiding","author":"Clayton R.","year":"2001","unstructured":"R. Clayton , G. Danezis , and M. G. Kuhn . Real world patterns of failure in anonymity systems. Information Hiding 2001 , LNCS 2137, pp. 230 -- 245 , Springer-Verlag Berlin 2001.]] R. Clayton, G. Danezis, and M. G. Kuhn. Real world patterns of failure in anonymity systems. Information Hiding 2001, LNCS 2137, pp. 230--245, Springer-Verlag Berlin 2001.]]"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"e_1_3_2_1_11_1","first-page":"368","volume-title":"SSDBM","author":"Denning D. E.","year":"1983","unstructured":"D. E. Denning . A security model for the statistical database problem . In SSDBM , pages 368 -- 390 , 1983 .]] D. E. Denning. A security model for the statistical database problem. In SSDBM, pages 368--390, 1983.]]"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251375.1251396"},{"key":"e_1_3_2_1_13_1","volume-title":"Kesdogan. The Hitting Set Attack on Anonymity Protocols. In Proceedings of Information Hiding, 7th International Workshop. Springer Verlag","author":"Dogan L. P.","year":"2004","unstructured":"L. P. Dogan Kesdogan. The Hitting Set Attack on Anonymity Protocols. In Proceedings of Information Hiding, 7th International Workshop. Springer Verlag , 2004 .]] L. P. Dogan Kesdogan. The Hitting Set Attack on Anonymity Protocols. In Proceedings of Information Hiding, 7th International Workshop. Springer Verlag, 2004.]]"},{"key":"e_1_3_2_1_15_1","volume-title":"Datenschutz und Anonymit\u00e4t","author":"Gerhard Paass U. W.","year":"1985","unstructured":"U. W. Gerhard Paass . Datenzugang , Datenschutz und Anonymit\u00e4t . Oldenbourg , M\u00fcnchen , 1985 . (in german).]] U. W. Gerhard Paass. Datenzugang, Datenschutz und Anonymit\u00e4t. Oldenbourg, M\u00fcnchen, 1985. (in german).]]"},{"key":"e_1_3_2_1_16_1","first-page":"69","article-title":"Methoden zur Anonymisierung wirtschaftsstatistischer Einzeldaten","volume":"42","author":"H\u00f6hne J.","year":"2003","unstructured":"J. H\u00f6hne . Methoden zur Anonymisierung wirtschaftsstatistischer Einzeldaten . Forum der Bundesstatistik , 42 : 69 -- 94 , 2003 .]] J. H\u00f6hne. Methoden zur Anonymisierung wirtschaftsstatistischer Einzeldaten. Forum der Bundesstatistik, 42:69--94, 2003.]]","journal-title":"Forum der Bundesstatistik"},{"key":"e_1_3_2_1_17_1","volume-title":"5th International Workshop. Springer Verlag","author":"Kesdogan D.","year":"2002","unstructured":"D. Kesdogan , D. Agrawal , and S. Penz . Limits of Anonymity in Open Environments. In Information Hiding , 5th International Workshop. Springer Verlag , 2002 .]] D. Kesdogan, D. Agrawal, and S. Penz. Limits of Anonymity in Open Environments. In Information Hiding, 5th International Workshop. Springer Verlag, 2002.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"June","author":"K\u00f6hntopp M.","year":"2001","unstructured":"M. K\u00f6hntopp and A. Pfitzmann . Anonymity, unobservability, and pseudonymity - a proposal for terminology. Draft v0.12 ., June 2001 .]] M. K\u00f6hntopp and A. Pfitzmann. Anonymity, unobservability, and pseudonymity - a proposal for terminology. Draft v0.12., June 2001.]]"},{"key":"e_1_3_2_1_19_1","unstructured":"M. Bauer and M. Meints (Editors). Structured overview on prototypes and concepts of identity management systems; fidis del. 3.1. available from http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.1.over%view_on_IMS.pdf.]]  M. Bauer and M. Meints (Editors). Structured overview on prototypes and concepts of identity management systems; fidis del. 3.1. available from http:\/\/www.fidis.net\/fileadmin\/fidis\/deliverables\/fidis-wp3-del3.1.over%view_on_IMS.pdf.]]"},{"key":"e_1_3_2_1_20_1","volume-title":"Rechtssicherheit trotz anonymit\u00e4t in offenen digitalen systemen. Datenschutz und Datensicherung (DuD), 14(5-6):243--253, 305--315","author":"Pfitzmann B.","year":"1990","unstructured":"B. Pfitzmann , M. Waidner , and A. Pfitzmann . Rechtssicherheit trotz anonymit\u00e4t in offenen digitalen systemen. Datenschutz und Datensicherung (DuD), 14(5-6):243--253, 305--315 , 1990 . Vieweg , Wiesbaden .]] B. Pfitzmann, M. Waidner, and A. Pfitzmann. Rechtssicherheit trotz anonymit\u00e4t in offenen digitalen systemen. Datenschutz und Datensicherung (DuD), 14(5-6):243--253, 305--315, 1990. Vieweg, Wiesbaden.]]"},{"key":"e_1_3_2_1_21_1","volume-title":"Datenschutz und Datensicherheit","author":"Pommerening K.","year":"1991","unstructured":"K. Pommerening . Datenschutz und Datensicherheit . BI-Wissenschaftsverlag , Mannheim, Wien , Z\u00fcrich, 1991 . ISBN 3-411-15171-4 (in german).]] K. Pommerening. Datenschutz und Datensicherheit. BI-Wissenschaftsverlag, Mannheim, Wien, Z\u00fcrich, 1991. ISBN 3-411-15171-4 (in german).]]"},{"key":"e_1_3_2_1_22_1","unstructured":"PRIME - Privacy and Identity Management for Europe. http:\/\/www.prime-project.eu.org.]]  PRIME - Privacy and Identity Management for Europe. http:\/\/www.prime-project.eu.org.]]"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/371931.371972"},{"key":"e_1_3_2_1_24_1","volume-title":"Masking and re-identification methods for public-use microdata: Overview and research problems. Research Report #2004-06","author":"Winkler W.","year":"2004","unstructured":"W. Winkler . Masking and re-identification methods for public-use microdata: Overview and research problems. Research Report #2004-06 , U.S. Bureau of the Census, October 2004 .]] W. Winkler. Masking and re-identification methods for public-use microdata: Overview and research problems. Research Report #2004-06, U.S. Bureau of the Census, October 2004.]]"},{"key":"e_1_3_2_1_25_1","volume-title":"Statistische \"Amter des Bundes und der L\u00e4nder","author":"Z\u00fchlke S.","year":"2005","unstructured":"S. Z\u00fchlke , M. Zwick , S. Scharnhorst , and T. Wende . The research data centres of the federal statistical office and the statistical offices of the l\u00e4nder. FDZ-Arbeitspapier~3 , Statistische \"Amter des Bundes und der L\u00e4nder , March 2005 . http:\/\/www.forschungsdatenzentrum.de\/publikationen\/arbeitspapiere\/03.asp.]] S. Z\u00fchlke, M. Zwick, S. Scharnhorst, and T. Wende. The research data centres of the federal statistical office and the statistical offices of the l\u00e4nder. FDZ-Arbeitspapier~3, Statistische \"Amter des Bundes und der L\u00e4nder, March 2005. http:\/\/www.forschungsdatenzentrum.de\/publikationen\/arbeitspapiere\/03.asp.]]"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Fairfax VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 2005 workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102486.1102501","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102486.1102501","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:00Z","timestamp":1750262880000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102486.1102501"}},"subtitle":["protection against re-identification and profiling"],"short-title":[],"issued":{"date-parts":[[2005,11,11]]},"references-count":23,"alternative-id":["10.1145\/1102486.1102501","10.1145\/1102486"],"URL":"https:\/\/doi.org\/10.1145\/1102486.1102501","relation":{},"subject":[],"published":{"date-parts":[[2005,11,11]]},"assertion":[{"value":"2005-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}