Katrin Borcea-Pfitzmann

Learn More
Privacy-Enhancing Identity Management (PIM) enables us-ers to control which personal information they provide to their communication partner(s) by partitioning their personal information into partial identities for themselves. Since partial identities must not be linkable, they cannot share a global name. Therefore, pseudonyms are used as identifiers.We(More)
Over the last two decades, privacy has been fading away. Some people have even stated: You have zero privacy – get over it! As privacy researchers, we are not willing to accept this statement. Therefore, we analyze the causes for this fading away of privacy, and develop a set of approaches to preserve or even regain privacy. We argue that Privacy 3.0 should(More)
Over the last two decades, privacy has been fading away. Some people have even stated: You have zero privacy – get over it! As privacy researchers, we are not willing to accept this statement. Therefore, we analyze the causes for this fading away of privacy, and develop a set of approaches to preserve or even regain privacy. We argue that Privacy 3.0 should(More)
In the course of the strengthened activities in eBusiness and the connected increasing awareness of privacy aspects, users of another application area become more and more sensitized of the problem field of the users' privacy $eLearning. With this paper we aim to increase the consciousness of the eLearning community for the relevance of preserving privacy(More)
Based on a widely cited terminology, this paper provides different interpretations of concepts introduced in the terminology asking for an implementable privacy model for computer-mediated interactions between individuals. A separation of the digital world and the physical world is proposed, as well as a linkage of the two worlds. The digital world contains(More)
Supporting privacy in eLearning becomes a commonly admitted important issue when designing according infrastructures. This is motivated by a higher awareness of the users with respect to protecting their personal data. In particular, eLearning comprises many scenarios that clearly spell out risks to the users’ privacy, such as communicating identifying data(More)
Access control is necessary to prevent illegal accesses to shared resources. Within eLearning, access control is required in order to protect provided contents and services as well as user data. Usually, access rights are assigned to users of a system. However, in a system that applies privacy-enhancing identity management (PIM) common approaches cannot be(More)
The design of identity management preserving an individual’s privacy must not stop at supporting the user in managing her/his present identities. Instead, since any kind of privacy intrusion may have implications on the individual’s future life, it is necessary that we identify and understand the issues related to longterm aspects of privacyenhancing(More)