Privacy and Trust in Distributed Networks View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2003

AUTHORS

Thomas Rössler , Arno Hollosi

ABSTRACT

Today distributed service frameworks play an ever more important role. Transitive trust is of great importance in such frameworks and is well researched. Although there are many solutions for building and transmitting trust in distributed networks, impacts on privacy are often neglected. Based on a trust metric it will be shown why insufficient trust is eventually inevitable if a request or message pass through a chain of services. Depending on the reaction of the service, privacy critical information may leak to other entities in the chain. It is shown that even simple error messages pose a privacy threat and that proper re-authentication methods should be used instead. Several methods of re-authentication and their impacts on privacy are discussed. More... »

PAGES

117-131

Book

TITLE

Communications and Multimedia Security. Advanced Techniques for Network and Data Protection

ISBN

978-3-540-20185-4
978-3-540-45184-6

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-540-45184-6_10

DOI

http://dx.doi.org/10.1007/978-3-540-45184-6_10

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1033432826


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "R\u00f6ssler", 
        "givenName": "Thomas", 
        "id": "sg:person.010026563665.27", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010026563665.27"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria", 
          "id": "http://www.grid.ac/institutes/grid.410413.3", 
          "name": [
            "Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Hollosi", 
        "givenName": "Arno", 
        "id": "sg:person.013157272711.58", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013157272711.58"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2003", 
    "datePublishedReg": "2003-01-01", 
    "description": "Today distributed service frameworks play an ever more important role. Transitive trust is of great importance in such frameworks and is well researched. Although there are many solutions for building and transmitting trust in distributed networks, impacts on privacy are often neglected. Based on a trust metric it will be shown why insufficient trust is eventually inevitable if a request or message pass through a chain of services. Depending on the reaction of the service, privacy critical information may leak to other entities in the chain. It is shown that even simple error messages pose a privacy threat and that proper re-authentication methods should be used instead. Several methods of re-authentication and their impacts on privacy are discussed.", 
    "editor": [
      {
        "familyName": "Lioy", 
        "givenName": "Antonio", 
        "type": "Person"
      }, 
      {
        "familyName": "Mazzocchi", 
        "givenName": "Daniele", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-540-45184-6_10", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-20185-4", 
        "978-3-540-45184-6"
      ], 
      "name": "Communications and Multimedia Security. Advanced Techniques for Network and Data Protection", 
      "type": "Book"
    }, 
    "keywords": [
      "simple error messages", 
      "chain of services", 
      "privacy threats", 
      "transitive trust", 
      "trust metrics", 
      "error messages", 
      "service framework", 
      "distributed network", 
      "privacy", 
      "such frameworks", 
      "critical information", 
      "network", 
      "insufficient trust", 
      "trust", 
      "services", 
      "framework", 
      "requests", 
      "messages", 
      "metrics", 
      "information", 
      "great importance", 
      "method", 
      "entities", 
      "threat", 
      "today", 
      "solution", 
      "pass", 
      "important role", 
      "chain", 
      "impact", 
      "importance", 
      "role", 
      "reaction"
    ], 
    "name": "Privacy and Trust in Distributed Networks", 
    "pagination": "117-131", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1033432826"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-540-45184-6_10"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-540-45184-6_10", 
      "https://app.dimensions.ai/details/publication/pub.1033432826"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:29", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_182.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-540-45184-6_10"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-45184-6_10'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-45184-6_10'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-45184-6_10'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-540-45184-6_10'


 

This table displays all metadata directly associated to this object as RDF triples.

105 TRIPLES      23 PREDICATES      59 URIs      52 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-540-45184-6_10 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N9d94f8ba4e8041f1af7a589d5e60a7a8
4 schema:datePublished 2003
5 schema:datePublishedReg 2003-01-01
6 schema:description Today distributed service frameworks play an ever more important role. Transitive trust is of great importance in such frameworks and is well researched. Although there are many solutions for building and transmitting trust in distributed networks, impacts on privacy are often neglected. Based on a trust metric it will be shown why insufficient trust is eventually inevitable if a request or message pass through a chain of services. Depending on the reaction of the service, privacy critical information may leak to other entities in the chain. It is shown that even simple error messages pose a privacy threat and that proper re-authentication methods should be used instead. Several methods of re-authentication and their impacts on privacy are discussed.
7 schema:editor N4cc8a0c83c9d4483b9a186554eda3fd4
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nda2ff35560cc4929890dd85d82cd8016
12 schema:keywords chain
13 chain of services
14 critical information
15 distributed network
16 entities
17 error messages
18 framework
19 great importance
20 impact
21 importance
22 important role
23 information
24 insufficient trust
25 messages
26 method
27 metrics
28 network
29 pass
30 privacy
31 privacy threats
32 reaction
33 requests
34 role
35 service framework
36 services
37 simple error messages
38 solution
39 such frameworks
40 threat
41 today
42 transitive trust
43 trust
44 trust metrics
45 schema:name Privacy and Trust in Distributed Networks
46 schema:pagination 117-131
47 schema:productId Nb12fe1a95db1491c84ec9d01e5bd14b4
48 Nba7a4f2b61844f22b0b455e759eaca15
49 schema:publisher Na8559db2232e4d87b1aa75cb6075a0f5
50 schema:sameAs https://app.dimensions.ai/details/publication/pub.1033432826
51 https://doi.org/10.1007/978-3-540-45184-6_10
52 schema:sdDatePublished 2022-06-01T22:29
53 schema:sdLicense https://scigraph.springernature.com/explorer/license/
54 schema:sdPublisher N17ef510abf7d48508fd32a6b959608ef
55 schema:url https://doi.org/10.1007/978-3-540-45184-6_10
56 sgo:license sg:explorer/license/
57 sgo:sdDataset chapters
58 rdf:type schema:Chapter
59 N17ef510abf7d48508fd32a6b959608ef schema:name Springer Nature - SN SciGraph project
60 rdf:type schema:Organization
61 N4cc8a0c83c9d4483b9a186554eda3fd4 rdf:first Nbb4c73cfafb54ff3ab2d5d3f1573296e
62 rdf:rest N6cf9498f4362481486743418e75e2c6d
63 N6cf9498f4362481486743418e75e2c6d rdf:first N93016cf3a7cd443195e4e7644ece515b
64 rdf:rest rdf:nil
65 N93016cf3a7cd443195e4e7644ece515b schema:familyName Mazzocchi
66 schema:givenName Daniele
67 rdf:type schema:Person
68 N9d94f8ba4e8041f1af7a589d5e60a7a8 rdf:first sg:person.010026563665.27
69 rdf:rest Ndb201e2dfe964f54816fd31a2fc6108e
70 Na8559db2232e4d87b1aa75cb6075a0f5 schema:name Springer Nature
71 rdf:type schema:Organisation
72 Nb12fe1a95db1491c84ec9d01e5bd14b4 schema:name doi
73 schema:value 10.1007/978-3-540-45184-6_10
74 rdf:type schema:PropertyValue
75 Nba7a4f2b61844f22b0b455e759eaca15 schema:name dimensions_id
76 schema:value pub.1033432826
77 rdf:type schema:PropertyValue
78 Nbb4c73cfafb54ff3ab2d5d3f1573296e schema:familyName Lioy
79 schema:givenName Antonio
80 rdf:type schema:Person
81 Nda2ff35560cc4929890dd85d82cd8016 schema:isbn 978-3-540-20185-4
82 978-3-540-45184-6
83 schema:name Communications and Multimedia Security. Advanced Techniques for Network and Data Protection
84 rdf:type schema:Book
85 Ndb201e2dfe964f54816fd31a2fc6108e rdf:first sg:person.013157272711.58
86 rdf:rest rdf:nil
87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
88 schema:name Information and Computing Sciences
89 rdf:type schema:DefinedTerm
90 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
91 schema:name Data Format
92 rdf:type schema:DefinedTerm
93 sg:person.010026563665.27 schema:affiliation grid-institutes:grid.410413.3
94 schema:familyName Rössler
95 schema:givenName Thomas
96 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.010026563665.27
97 rdf:type schema:Person
98 sg:person.013157272711.58 schema:affiliation grid-institutes:grid.410413.3
99 schema:familyName Hollosi
100 schema:givenName Arno
101 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013157272711.58
102 rdf:type schema:Person
103 grid-institutes:grid.410413.3 schema:alternateName Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria
104 schema:name Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology, Inffeldgasse 16a, 8010, Graz, Austria
105 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...