Learn More
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We(More)
With the increasing popularity of Component-Based Software Engineering, considering non-functional properties like QoS and security becomes an ever-important challenge. Both issues are crosscutting concerns that benefit from a separated consideration as aspects. The interference of both is a non-trivial problem that has to be dealt with at various levels(More)
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in order to protect provided contents and services as well as user data. Usually, access rights are assigned to users of a system. However, in a system that applies privacy-enhancing identity management (PIM) common approaches cannot be(More)