Implementability of the Identity Management Part in Pfitzmann/Hansen s Terminology for a Complex Digital World

Size: px
Start display at page:

Download "Implementability of the Identity Management Part in Pfitzmann/Hansen s Terminology for a Complex Digital World"

Transcription

1 Faculty of Computer Science, Institute of Architecture of Systems, Chair of Data Security and Data Protection Implementability of the Identity Management Part in Pfitzmann/Hansen s Terminology for a Complex Digital World Manuela Berg, Katrin Borcea-Pfitzmann Helsingborg,

2 Goal computer-mediated interaction between individuals using a description of a complex digital world identifying objects for acting entities needed for applications definition of privacy TU Dresden, Implementability of Terminology 2 / 37

3 01 The Problem Set 02 Problems Arising from the Terminology 03 Separating the Digital World from the Physical World 04 Definition of Privacy 05 Summary and Further Research TU Dresden, Implementability of Terminology 3 / 37

4 01 The Problem Set The Complex Digital World TU Dresden, Implementability of Terminology 4 / 37

5 Traditional Sender-Receiver Model one sender one receiver flow of data fixed time TU Dresden, Implementability of Terminology 5 / 37

6 Why not only the Sender-Receiver Model? Who are the senders and the receivers? 1. focus on individuals 2. individuals and their representations TU Dresden, Implementability of Terminology 6 / 37

7 Why not only the Sender-Receiver Model? Who are the senders and the receivers? How many senders and receivers? TU Dresden, Implementability of Terminology 7 / 37

8 Why not only the Sender-Receiver Model? Who are the senders and the receivers? How many senders and receivers? Which duration of time? TU Dresden, Implementability of Terminology 8 / 37

9 Why not only the Sender-Receiver Model? Who are the senders and the receivers? How many senders and receivers? Which duration of time? Which kind of relationship between senders and receivers? not necessarily flow of data roles not fixed different quality and quantity TU Dresden, Implementability of Terminology 9 / 37

10 Why not only the Sender-Receiver Model? Who are the senders and the receivers? How many senders and receivers? Which duration of time? Which kind of relationship between senders and receivers? not necessarily flow of data roles not fixed different quality and quantity What about different situations? TU Dresden, Implementability of Terminology 10 / 37

11 Comparison Sender-Receiver Model Sender and receiver Fixed time Data flow as relationship One-to-one relationships No interest in situations Complex Digital World Not necessarily fixed senders and receivers Dynamic time possible Different qualities and quantities of relationships Many-to-many relationships Situations might make the difference TU Dresden, Implementability of Terminology 11 / 37

12 01 The Problem Set [Pfitzmann/Hansen] TU Dresden, Implementability of Terminology 12 / 37

13 The Terminology [Pfitzmann/Hansen 2000]: Anonymity, unobservability, and pseudonymity - a proposal for terminology 1st publication [Pfitzmann/Hansen 2010]: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management continuously evolving TU Dresden, Implementability of Terminology 13 / 37

14 Definition of subject A subject is a possibly acting entity such as, e.g., a human being (i.e., a natural person), a legal person, or a computer. Definitions of Anonymity Identity based on subject (and individual person) TU Dresden, Implementability of Terminology 14 / 37

15 02 Problems Arising from the Terminology Anonymity TU Dresden, Implementability of Terminology 15 / 37

16 Definition of anonymity [Pfitzmann/Hansen] Anonymity of a subject from an attacker's perspective means that the attacker cannot sufficiently identify the subject within a set of subjects, the anonymity set. TU Dresden, Implementability of Terminology 16 / 37

17 1. Anonymity of an individual in a set of individuals - as in the definition 2. Anonymity of a digital representation in a set of digital representations - contained in the definition - not distinguishable from Anonymity in the sense of unlinkability between an individual and his digital representations anonymization in the German law for data protection 3 (6) [BDSG] : act of making personal data anonymous as the transformation of personal data in a way to make it difficult or impossible to link personal data to the individual. TU Dresden, Implementability of Terminology 17 / 37

18 02 Problems Arising from the Terminology Identity TU Dresden, Implementability of Terminology 18 / 37

19 [Pfitzmann/Hansen 2010]: An identity is any subset of attribute values of an individual person which sufficiently identifies this individual person within any set of persons. Necessary design decision What is contained in the identity? Are perceptions contained in the identity? -perception of an individual about others -perception of others about the individual When are identities equal (or sufficiently equal)? Who establishes an identity? TU Dresden, Implementability of Terminology 19 / 37

20 Identity as socio-centric concept Means that each identity is omnipresent Unique individual characterization Identity as ego-centric concept More appropriate for interaction between individuals Perceptions included as attributes TU Dresden, Implementability of Terminology 20 / 37

21 02 Problems Arising from the Terminology Privacy TU Dresden, Implementability of Terminology 21 / 37

22 Definition of Privacy [Westin 67]: Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. claim individuals, groups, or institutions information others situations TU Dresden, Implementability of Terminology 22 / 37

23 03 Separating the Digital World from the Physical World TU Dresden, Implementability of Terminology 23 / 37

24 Data and Information [Dict]: Data is a group of symbols or continuous functions which become information due to known or supposed agreements. Data is supposed to be processed and are the result of processing. Information is the knowledge about states and events in the real world. TU Dresden, Implementability of Terminology 24 / 37

25 Entities, Oge() and Ego() Digital entities as pure data (in the digital world) Physical entities as collection of information (in the physical world) Oge(): information data Ego(): data information Perceptions as part of the entities TU Dresden, Implementability of Terminology 25 / 37

26 04 Definition of Privacy TU Dresden, Implementability of Terminology 26 / 37

27 Definition of Privacy Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. TU Dresden, Implementability of Terminology 27 / 37

28 Definition of Privacy Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. claim result of negotiating and enforcing TU Dresden, Implementability of Terminology 28 / 37

29 Definition of Privacy Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. claim individuals, groups, or institutions result of negotiating and enforcing physical entity TU Dresden, Implementability of Terminology 29 / 37

30 Definition of Privacy Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. claim individuals, groups, or institutions information result of negotiating and enforcing physical entity data TU Dresden, Implementability of Terminology 30 / 37

31 Definition of Privacy Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. claim individuals, groups, or institutions information others result of negotiating and enforcing physical entity data whom TU Dresden, Implementability of Terminology 31 / 37

32 Definition of Privacy Privacy is the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others. claim individuals, groups, or institutions information others situations result of negotiating and enforcing physical entity data whom in which context TU Dresden, Implementability of Terminology 32 / 37

33 04 Summary and Further Research TU Dresden, Implementability of Terminology 33 / 37

34 Entities, Oge() and Ego() TU Dresden, Implementability of Terminology 34 / 37

35 Definition of Privacy Privacy of a physical entity is the result of negotiating and enforcing when, how, to what extent, and in which context which of its data is disclosed to whom.! Identity management as one consequence of the definition of privacy TU Dresden, Implementability of Terminology 35 / 37

36 Further Research Partial identities Organizations and groups Dynamics based on time Anonymity based on separation of physical and digital world Privacy definition: direct/indirect enclosing, encryption and data TU Dresden, Implementability of Terminology 36 / 37

37 Faculty of Computer Science, Institute of Architecture of Systems, Chair of Data Security and Data Protection Implementability of the Identity Management Part in Pfitzmann/Hansen s Terminology for a Complex Digital World Thank you for your attention!

38 References [Pfitzmann/Hansen 2000]: Pfitzmann, M. Köhntopp (Hansen): Anonymity, unobservability, and pseudonymity - a proposal for terminology. In H. Federrath (editor): Workshop on Design Issues in Anonymity and Unobservability. Volume 2009 of Lecture Notes in Computer Science., Springer (2000), pages 1-9 [Pfitzmann/Hansen 2010]: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. dud.inf.tu-dresden.de/anon/terminology.shtml [Version v0.33 of April 8, 2010]. [BDSG]: Bundesdatenschutzgesetz: Erster Abschnitt. (1990) (version ) [Dict]: Schneider, U., Werner, D.: Taschenbuch der Informatik. 4. edn., Fachbuchverlag, Leipzig (2001) [Westin 67]: Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967) TU Dresden, Implementability of Terminology Folie 38 von XYZ

- A CONSOLIDATED PROPOSAL FOR TERMINOLOGY

- A CONSOLIDATED PROPOSAL FOR TERMINOLOGY ANONYMITY, UNLINKABILITY, UNDETECTABILITY, UNOBSERVABILITY, PSEUDONYMITY, AND IDENTITY MANAGEMENT - A CONSOLIDATED PROPOSAL FOR TERMINOLOGY Andreas Pfitzmann and Marit Hansen Version v0.31, Feb. 15, 2008

More information

Unlinkability and Redundancy in Anonymous Publication Systems

Unlinkability and Redundancy in Anonymous Publication Systems Unlinkability and Redundancy in Anonymous Publication Systems Christian Boesgaard pink@diku.dk Department of Computer Science University of Copenhagen Denmark January 22, 2004 1 Introduction An anonymous

More information

PROTECTION GOALS FOR PRIVACY ENGINEERING

PROTECTION GOALS FOR PRIVACY ENGINEERING PROTECTION GOALS FOR PRIVACY ENGINEERING Marit Hansen, Meiko Jensen, and Martin Rost International Workshop on Privacy Engineering May 21, 2015 Outline Security Protection Goals Privacy Protection Goals

More information

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments

Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Standards and privacy engineering ISO, OASIS, PRIPARE and Other Important Developments Antonio Kung, CTO 25 rue du Général Foy, 75008 Paris www.trialog.com 9 May 2017 1 Introduction Speaker Engineering

More information

A Foundation for Requirements Analysis of Privacy Preserving Software

A Foundation for Requirements Analysis of Privacy Preserving Software A Foundation for Requirements Analysis of Privacy Preserving Software Kristian Beckers, Maritta Heisel paluno - The Ruhr Institute for Software Technology University of Duisburg-Essen {firstname.lastname}@paluno.uni-due.de

More information

A Context Taxonomy Supporting Public System Design

A Context Taxonomy Supporting Public System Design Faculty of Computer Science, Institute of Software and Multimedia Technology Junior Professorship in Software Engineering of Ubiquitous Systems A Context Taxonomy Supporting Public System Design Pisa,

More information

Privacy engineering, privacy by design, and privacy governance

Privacy engineering, privacy by design, and privacy governance CyLab Lorrie Faith Cranor" Engineering & Public Policy acy & Secur ity Priv e l HT TP ratory bo La 8-533 / 8-733 / 19-608 / 95-818:! Privacy Policy, Law, and Technology CyLab U sab November 17, 2015 ://

More information

Data Protection and Ethics in Healthcare

Data Protection and Ethics in Healthcare Data Protection and Ethics in Healthcare Harald Zwingelberg ULD June 14 th, 2017 at Brocher Foundation, Geneva Organized by: with input by: Overview Goal: Protection of people Specific legal setting for

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ H. Nissenbaum Privacy as Contextual Integrity (Washington Law Review 2004) Common-Law Right

More information

A SECURITY MODEL FOR ANONYMOUS CREDENTIAL SYSTEMS

A SECURITY MODEL FOR ANONYMOUS CREDENTIAL SYSTEMS A SECURITY MODEL FOR ANONYMOUS CREDENTIAL SYSTEMS Andreas Pashalidis* and Chris J. Mitchell Information Security Group, Royal Holloway, University of London { A.Pashalidis,C.Mitchell }@rhul.ac.uk Abstract

More information

Using Variability Modeling Principles to Capture Architectural Knowledge

Using Variability Modeling Principles to Capture Architectural Knowledge Using Variability Modeling Principles to Capture Architectural Knowledge Marco Sinnema University of Groningen PO Box 800 9700 AV Groningen The Netherlands +31503637125 m.sinnema@rug.nl Jan Salvador van

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Creating and managing individual identities

Creating and managing individual identities Privacy and Identity Management When developing an identity management system, designers must consider the system s purpose and particular privacy needs. A set of guidelines and advice can help them make

More information

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments

An Introduction to a Taxonomy of Information Privacy in Collaborative Environments An Introduction to a Taxonomy of Information Privacy in Collaborative Environments GEOFF SKINNER, SONG HAN, and ELIZABETH CHANG Centre for Extended Enterprises and Business Intelligence Curtin University

More information

Is Transparency a useful Paradigm for Privacy?

Is Transparency a useful Paradigm for Privacy? Is Transparency a useful Paradigm for Privacy? Shonan Seminar, August 6 th, 2013 Japan Prof. Dr. Dr. h.c. Günter Müller Institute of Computer Science and Social Studies Department of Telematics Outline

More information

Combinators for bidirectional programs

Combinators for bidirectional programs Fakultät Informatik Theoretische Informatik, Lehrstuhl Programmierung Combinators for bidirectional programs Dresden, 29.01.2008 Small Example (1/4) A simple bookmark tree c Dresden URL Created Chemnitz

More information

CSE468 Information Conflict

CSE468 Information Conflict CSE468 Information Conflict Lecturer: Dr Carlo Kopp, MIEEE, MAIAA, PEng Lecture 01 Introduction and Overview Reference Sources and Bibliography NOTE: There are a limited number of publications available

More information

Systematic Privacy by Design Engineering

Systematic Privacy by Design Engineering Systematic Privacy by Design Engineering Privacy by Design Let's have it! Information and Privacy Commissioner of Ontario Article 25 European General Data Protection Regulation the controller shall [...]

More information

MEDICINE LICENSE TO PUBLISH

MEDICINE LICENSE TO PUBLISH MEDICINE LICENSE TO PUBLISH This LICENSE TO PUBLISH (this License ), dated as of: DATE (the Effective Date ), is executed by the corresponding author listed on Schedule A (the Author ) to grant a license

More information

DaPIS: an Ontology-based Data Protection Icon Set

DaPIS: an Ontology-based Data Protection Icon Set DaPIS: an Ontology-based Data Protection Icon Set Monica Palmirani*, Arianna Rossi* Law via the Internet Florence, October 11, 2018 *CIRSFID, University of Bologna; ICR, University of Luxembourg The information

More information

PATENT ATTORNEYS EXAMINATION

PATENT ATTORNEYS EXAMINATION 2011 PATENT ATTORNEYS EXAMINATION PAPER A1 The New Zealand Law and Practice relating to Patents and Designs Regulation 158 (1) (a) Duration: 3 hours (plus 10 minutes for reading) When considering answers

More information

Fakultät Informatik. arxiv: v1 [cs.cy] 4 May Technische Berichte Technical Reports. Katrin Borcea-Pfitzmann, Anne-Katrin Stange

Fakultät Informatik. arxiv: v1 [cs.cy] 4 May Technische Berichte Technical Reports. Katrin Borcea-Pfitzmann, Anne-Katrin Stange arxiv:0705.0612v1 [cs.cy] 4 May 2007 Technische Berichte Technical Reports ISSN 1430-211X Fakultät Informatik TUD-FI07-01 Februar 2007 Katrin Borcea-Pfitzmann, Anne-Katrin Stange Institut für Systemarchitektur

More information

Global Alliance for Genomics & Health Data Sharing Lexicon

Global Alliance for Genomics & Health Data Sharing Lexicon Version 1.0, 15 March 2016 Global Alliance for Genomics & Health Data Sharing Lexicon Preamble The Global Alliance for Genomics and Health ( GA4GH ) is an international, non-profit coalition of individuals

More information

Towards Location and Trajectory Privacy Protection in Participatory Sensing

Towards Location and Trajectory Privacy Protection in Participatory Sensing Towards Location and Trajectory Privacy Protection in Participatory Sensing Sheng Gao 1, Jianfeng Ma 1, Weisong Shi 2 and Guoxing Zhan 2 1 Xidian University, Xi an, Shaanxi 710071, China 2 Wayne State

More information

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND

The University of Sheffield Research Ethics Policy Note no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND The University of Sheffield Research Ethics Policy te no. 14 RESEARCH INVOLVING SOCIAL MEDIA DATA 1. BACKGROUND Social media are communication tools that allow users to share information and communicate

More information

NanoZEIT. The Nanoelectronics Center of the Faculty of Electrical and Computer Engineering at Technische Universitaet Dresden

NanoZEIT. The Nanoelectronics Center of the Faculty of Electrical and Computer Engineering at Technische Universitaet Dresden Faculty of Electrical and Computer Engineering NanoZEIT The Nanoelectronics Center of the Faculty of Electrical and Computer Engineering at Technische Universitaet Dresden Dresden, October 20 th, 2010

More information

Identifying and Managing Joint Inventions

Identifying and Managing Joint Inventions Page 1, is a licensing manager at the Wisconsin Alumni Research Foundation in Madison, Wisconsin. Introduction Joint inventorship is defined by patent law and occurs when the outcome of a collaborative

More information

Autonomous Robotic (Cyber) Weapons?

Autonomous Robotic (Cyber) Weapons? Autonomous Robotic (Cyber) Weapons? Giovanni Sartor EUI - European University Institute of Florence CIRSFID - Faculty of law, University of Bologna Rome, November 24, 2013 G. Sartor (EUI-CIRSFID) Autonomous

More information

Privacy Policy SOP-031

Privacy Policy SOP-031 SOP-031 Version: 2.0 Effective Date: 18-Nov-2013 Table of Contents 1. DOCUMENT HISTORY...3 2. APPROVAL STATEMENT...3 3. PURPOSE...4 4. SCOPE...4 5. ABBREVIATIONS...5 6. PROCEDURES...5 6.1 COLLECTION OF

More information

Future of Identity in the Information Society. Title: D 17.1 Modelling New Forms of Identities: Applicability of the Model Based on Virtual Persons

Future of Identity in the Information Society. Title: D 17.1 Modelling New Forms of Identities: Applicability of the Model Based on Virtual Persons Future of Identity in the Information Society Title: D 17.1 Author: Editor: Co-editor: Other contributors Reviewers: Modelling New Forms of Identities: Applicability of the Model Based on Virtual Persons

More information

Lecture 2: Sum rule, partition method, difference method, bijection method, product rules

Lecture 2: Sum rule, partition method, difference method, bijection method, product rules Lecture 2: Sum rule, partition method, difference method, bijection method, product rules References: Relevant parts of chapter 15 of the Math for CS book. Discrete Structures II (Summer 2018) Rutgers

More information

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017

CONSENT IN THE TIME OF BIG DATA. Richard Austin February 1, 2017 CONSENT IN THE TIME OF BIG DATA Richard Austin February 1, 2017 1 Agenda 1. Introduction 2. The Big Data Lifecycle 3. Privacy Protection The Existing Landscape 4. The Appropriate Response? 22 1. Introduction

More information

SAUDI ARABIAN STANDARDS ORGANIZATION (SASO) TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY

SAUDI ARABIAN STANDARDS ORGANIZATION (SASO) TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY SAUDI ARABIAN STANDARDS ORGANIZATION (SASO) TECHNICAL DIRECTIVE PART ONE: STANDARDIZATION AND RELATED ACTIVITIES GENERAL VOCABULARY D8-19 7-2005 FOREWORD This Part of SASO s Technical Directives is Adopted

More information

A Pattern Catalog for GDPR Compliant Data Protection

A Pattern Catalog for GDPR Compliant Data Protection A Pattern Catalog for GDPR Compliant Data Protection Dominik Huth, 22.11.2017, PoEM Doctoral Consortium Chair of Software Engineering for Business Information Systems (sebis) Faculty of Informatics Technische

More information

(1) Patents/Patentable means:

(1) Patents/Patentable means: 3344-17-02 Patents policy. (A) (B) (C) Research is recognized as an integral part of the educational process to generate new knowledge; to encourage the spirit of inquiry; and to develop scientists, engineers,

More information

PHOTO IS:RAEL The International Photography Festival Open Call for PHOTO IS:RAEL - the 6 th International Photography Festival Rules and Regulations

PHOTO IS:RAEL The International Photography Festival Open Call for PHOTO IS:RAEL - the 6 th International Photography Festival Rules and Regulations PHOTO IS:RAEL The International Photography Festival Open Call for PHOTO IS:RAEL - the 6 th International Photography Festival Rules and Regulations PHOTO IS:RAEL invites artists to submit proposals for

More information

Pure Versus Applied Informatics

Pure Versus Applied Informatics Pure Versus Applied Informatics A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The structure of mathematics as a discipline. Analysing Pure

More information

On the Simulation of Oscillator Phase Noise

On the Simulation of Oscillator Phase Noise On the Simulation of Oscillator Phase Noise Workshop at Chair of Communications Theory, May 2008 Christian Müller Communications Laboratory Department of Electrical Engineering and Information Technology

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Privacy framework INTERNATIONAL STANDARD ISO/IEC 29100 First edition 2011-12-15 Information technology Security techniques Privacy framework Technologies de l'information Techniques de sécurité Cadre privé Reference number

More information

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu)

Policy Contents. Policy Information. Purpose and Summary. Scope. Published on Policies and Procedures (http://policy.arizona.edu) Published on Policies and Procedures (http://policy.arizona.edu) Home > Intellectual Property Policy Policy Contents Purpose and Summary Scope Definitions Policy Related Information* Revision History*

More information

Session 1, Part 2: Emerging issues in e-commerce Australian experiences of privacy and consumer protection regulation

Session 1, Part 2: Emerging issues in e-commerce Australian experiences of privacy and consumer protection regulation 2013/ SOM3/CTI/WKSP1/007 Australian Experiences of Privacy and Consumer Protection Regulation Submitted by: Australia Workshop on Building and Enhancing FTA Negotiation Skills on e-commerce Medan, Indonesia

More information

BBMRI-ERIC WEBINAR SERIES #2

BBMRI-ERIC WEBINAR SERIES #2 BBMRI-ERIC WEBINAR SERIES #2 NOTE THIS WEBINAR IS BEING RECORDED! ANONYMISATION/PSEUDONYMISATION UNDER GDPR IRENE SCHLÜNDER WHY ANONYMISE? Get rid of any data protection constraints Any processing of personal

More information

Patent Due Diligence

Patent Due Diligence Patent Due Diligence By Charles Pigeon Understanding the intellectual property ("IP") attached to an entity will help investors and buyers reap the most from their investment. Ideally, startups need to

More information

Enabling Trust in e-business: Research in Enterprise Privacy Technologies

Enabling Trust in e-business: Research in Enterprise Privacy Technologies Enabling Trust in e-business: Research in Enterprise Privacy Technologies Dr. Michael Waidner IBM Zurich Research Lab http://www.zurich.ibm.com / wmi@zurich.ibm.com Outline Motivation Privacy-enhancing

More information

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary

LAB3-R04 A Hard Privacy Impact Assessment. Post conference summary LAB3-R04 A Hard Privacy Impact Assessment Post conference summary John Elliott Joanne Furtsch @withoutfire @PrivacyGeek Table of Contents THANK YOU... 3 WHAT IS PRIVACY?... 3 The European Perspective...

More information

Privacy in a Networked World: Trouble with Anonymization, Aggregates

Privacy in a Networked World: Trouble with Anonymization, Aggregates Privacy in a Networked World: Trouble with Anonymization, Aggregates Historical US Privacy Laws First US Law dates back to: 1890 Protecting privacy of Individuals against government agents 1973 report.

More information

Privacy Policy. Catalyst.Net Limited. Version 1.0

Privacy Policy. Catalyst.Net Limited. Version 1.0 Privacy Policy Catalyst.Net Limited Version 1.0 November 2017 1 Scope 1.1. This Privacy Policy describes how Catalyst collects, uses, discloses, stores and gives access to Personal Information in accordance

More information

Analysis of Privacy and Data Protection Laws and Directives Around the World

Analysis of Privacy and Data Protection Laws and Directives Around the World Analysis of Privacy and Data Protection Laws and Directives Around the World Michael Willett (Seagate) ISTPA Board and Framework Chair Track IIB: Global Privacy Policy The Privacy Symposium: Boston, 23

More information

An Ontology for Modelling Security: The Tropos Approach

An Ontology for Modelling Security: The Tropos Approach An Ontology for Modelling Security: The Tropos Approach Haralambos Mouratidis 1, Paolo Giorgini 2, Gordon Manson 1 1 University of Sheffield, Computer Science Department, UK {haris, g.manson}@dcs.shef.ac.uk

More information

Maintaining privacy in pervasive computing enabling acceptance of sensor-based services

Maintaining privacy in pervasive computing enabling acceptance of sensor-based services Maintaining privacy in pervasive computing enabling acceptance of sensor-based services A Soppera and T Burbridge In the near future, everyday objects like cars and home appliances will connect the living

More information

Personal Data Protection Competency Framework for School Students. Intended to help Educators

Personal Data Protection Competency Framework for School Students. Intended to help Educators Conférence INTERNATIONAL internationale CONFERENCE des OF PRIVACY commissaires AND DATA à la protection PROTECTION des données COMMISSIONERS et à la vie privée Personal Data Protection Competency Framework

More information

Trusted Data Intermediaries

Trusted Data Intermediaries Workshop Summary Trusted Data Intermediaries Civil society organizations increasingly use a combination of money, time and digital data for public good. The question facing these organizations is how to

More information

DC Core Internet Values discussion paper 2017

DC Core Internet Values discussion paper 2017 DC Core Internet Values discussion paper 2017 Focus on Freedom from Harm Introduction The Internet connects a world of multiple languages, connects people dispersed across cultures, places knowledge dispersed

More information

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance

THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance THE UNIVERSITY OF AUCKLAND INTELLECTUAL PROPERTY CREATED BY STAFF AND STUDENTS POLICY Organisation & Governance 1. INTRODUCTION AND OBJECTIVES 1.1 This policy seeks to establish a framework for managing

More information

COM325 Computer Speech and Hearing

COM325 Computer Speech and Hearing COM325 Computer Speech and Hearing Part III : Theories and Models of Pitch Perception Dr. Guy Brown Room 145 Regent Court Department of Computer Science University of Sheffield Email: g.brown@dcs.shef.ac.uk

More information

PART III. Experience. Sarah Pink

PART III. Experience. Sarah Pink PART III Experience Sarah Pink DIGITAL ETHNOGRAPHY Ethnography is one of the most established research approaches for doing research with and about people, their experiences, everyday activities, relationships,

More information

Privacy Policy Referencing

Privacy Policy Referencing Privacy Policy Referencing Audun Jøsang 1 and Lothar Fritsch 2 and Tobias Mahler 3,2 1 UNIK University Graduate Center - University of Oslo josang@unik.no 2 Norwegian Computing Center Lothar.Fritsch@NR.no

More information

THE THREAT LANDSCAPE of connected vehicles and ITS integra>on in general. Sco$ CADZOW

THE THREAT LANDSCAPE of connected vehicles and ITS integra>on in general. Sco$ CADZOW 1 THE THREAT LANDSCAPE of connected vehicles and ITS integra>on in general Sco$ CADZOW 2 Your speaker? Sco$ CADZOW Expert and rapporteur for TETRA, ETSI s NGN, the Design for Assurance paradigm, the Privacy

More information

Privacy: how we do it and when it matters most

Privacy: how we do it and when it matters most Privacy: how we do it and when it matters most Christena Nippert-Eng, Ph.D. Professor of Sociology Chair, Department of Social Sciences Illinois Institute of Technology Institute for Security, Technology

More information

Privacy by Design and the New Protection Goals

Privacy by Design and the New Protection Goals Martin Rost, Kirsten Bock Privacy by Design and the New Protection Goals Principles, Goals, and Requirements Privacy by Design congregates seven principles promising a modern proactive approach to data

More information

BCD Adder. Lecture 21 1

BCD Adder. Lecture 21 1 BCD Adder -BCD adder A 4-bit binary adder that is capable of adding two 4-bit words having a BCD (binary-coded decimal) format. The result of the addition is a BCD-format 4-bit output word, representing

More information

Staffordshire Police

Staffordshire Police Staffordshire Police ANPR ANPR Project Document Reference: Author: D PLATT Date: 16 TH NOV 2012 Change Control Record Date Document Reference Change By 16/11/12 Initial version, for review D PLATT Contents

More information

THE ABC OF ABC: AN ANALYSIS OF ATTRIBUTE-BASED CREDENTIALS IN THE LIGHT OF DATA PROTECTION, PRIVACY AND IDENTITY

THE ABC OF ABC: AN ANALYSIS OF ATTRIBUTE-BASED CREDENTIALS IN THE LIGHT OF DATA PROTECTION, PRIVACY AND IDENTITY 19 THE ABC OF ABC: AN ANALYSIS OF ATTRIBUTE-BASED CREDENTIALS IN THE LIGHT OF DATA PROTECTION, PRIVACY AND IDENTITY Merel Koning PhD candidate at the Privacy & Identity Lab, based at the ICIS Digital Security,

More information

Lecture for January 25, 2016

Lecture for January 25, 2016 Lecture for January 25, 2016 ECS 235A UC Davis Matt Bishop January 25, 2016 ECS 235A, Matt Bishop Slide #1 Example English Policy Computer security policy for academic institution Institution has multiple

More information

The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective

The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective The Use of Privacy Enhancing Technologies for Biometric Systems Analysed from a Legal Perspective Els J. Kindt Abstract. The deployment of biometric systems could have serious life long implications for

More information

A Unified Model for Physical and Social Environments

A Unified Model for Physical and Social Environments A Unified Model for Physical and Social Environments José-Antonio Báez-Barranco, Tiberiu Stratulat, and Jacques Ferber LIRMM 161 rue Ada, 34392 Montpellier Cedex 5, France {baez,stratulat,ferber}@lirmm.fr

More information

IDENTITY MANAGEMENT FOR SELF -PORTRAYAL

IDENTITY MANAGEMENT FOR SELF -PORTRAYAL 231 IDENTITY MANAGEMENT FOR SELF -PORTRAYAL Toby Baier, 1 and Christian P. Kunze, 2 1 Distributed Systems Group - VSIS, University of Hamburg, Vogt-Kölln-Straße 30, 22527 Hamburg, Germany 2 Distributed

More information

Abstraction as a Vector: Distinguishing Philosophy of Science from Philosophy of Engineering.

Abstraction as a Vector: Distinguishing Philosophy of Science from Philosophy of Engineering. Paper ID #7154 Abstraction as a Vector: Distinguishing Philosophy of Science from Philosophy of Engineering. Dr. John Krupczak, Hope College Professor of Engineering, Hope College, Holland, Michigan. Former

More information

Intellectual Property

Intellectual Property Intellectual Property Technology Transfer and Intellectual Property Principles in the Conduct of Biomedical Research Frank Grassler, J.D. VP For Technology Development Office for Technology Development

More information

Digital Industrialisation in Developing Countries - A Review of the Business and Policy Landscape

Digital Industrialisation in Developing Countries - A Review of the Business and Policy Landscape 1 Digital Industrialisation in Developing Countries - A Review of the Business and Policy Landscape Executive Summary (As accompanying the full paper at https://tinyurl.com/digi-dev-countries ) Parminder

More information

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands

Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands INTELLIGENT AGENTS Catholijn M. Jonker and Jan Treur Vrije Universiteit Amsterdam, Department of Artificial Intelligence, Amsterdam, The Netherlands Keywords: Intelligent agent, Website, Electronic Commerce

More information

Cooperation and Control in Innovation Networks

Cooperation and Control in Innovation Networks Cooperation and Control in Innovation Networks Ilkka Tuomi @ meaningprocessing. com I. Tuomi 9 September 2010 page: 1 Agenda A brief introduction to the multi-focal downstream innovation model and why

More information

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS

MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS MANAGING USER PRIVACY IN UBIQUITOUS COMPUTING APPLICATIONS T.VENGATTARAMAN, P. DHAVACHELVAN Department of Computer Science, Pondicherry University, Puducherry, India. vengat.mailbox@gmail.com, dhavachelvan@gmail.com

More information

PLANNING YOUR COURSE OF STUDY (JURIS DOCTOR)

PLANNING YOUR COURSE OF STUDY (JURIS DOCTOR) PLANNING YOUR COURSE OF STUDY (JURIS DOCTOR) This list is provided to aid students in planning their course of study. The law school anticipates offering these courses during the listed semesters. Students

More information

Digital Image Processing

Digital Image Processing Digital Image Processing IMAGE PERCEPTION & ILLUSION Hamid R. Rabiee Fall 2015 Outline 2 What is color? Image perception Color matching Color gamut Color balancing Illusions What is Color? 3 Visual perceptual

More information

Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case

Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case Privacy Issues in Cross-Border Identity Management Systems: Pan-European Case Svetlana Sapelova 1,* and Borka Jerman-Blažič 2 1 Jozef Stefan International Postgraduate School, Ljubljana Slovenia svetka@e5.ijs.si

More information

CSC384 Intro to Artificial Intelligence* *The following slides are based on Fahiem Bacchus course lecture notes.

CSC384 Intro to Artificial Intelligence* *The following slides are based on Fahiem Bacchus course lecture notes. CSC384 Intro to Artificial Intelligence* *The following slides are based on Fahiem Bacchus course lecture notes. Artificial Intelligence A branch of Computer Science. Examines how we can achieve intelligent

More information

Flexibilities in the Patent System

Flexibilities in the Patent System Flexibilities in the Patent System Dr. N.S. Gopalakrishnan Professor, HRD Chair on IPR School of Legal Studies, Cochin University of Science & Technology, Cochin, Kerala 1 Introduction The Context Flexibilities

More information

Wireless Sensor Networks and Privacy

Wireless Sensor Networks and Privacy Wireless Sensor Networks and Privacy UbiSec & Sens Workshop Aachen 7.2.2008 Agenda ULD who we are and what we do Privacy and Data Protection concept and terminology Privacy and Security technologies a

More information

Location Privacy by Design - Technology & Business Incentives

Location Privacy by Design - Technology & Business Incentives Location Privacy by Design - Technology & Business Incentives Dr. Lothar Fritsch Norsk Regnesentral Norwegian Computing Center Oslo Internetdargana, Stockholm, 26-27.10.2010 Contents Location Privacy Concepts

More information

Artificial Intelligence and Society: the Challenges Ahead Yuko Harayama Executive Member Council for Science, Technology and Innovation (CSTI)

Artificial Intelligence and Society: the Challenges Ahead Yuko Harayama Executive Member Council for Science, Technology and Innovation (CSTI) OECD Technology Foresight Forum 2016 Artificial Intelligence: The Economic and Policy Implications November 17th, 2016 Artificial Intelligence and Society: the Challenges Ahead Yuko Harayama Executive

More information

Black Science Fiction Script Movie Project 2012

Black Science Fiction Script Movie Project 2012 Black Science Fiction Script Movie Project 2012 OFFICIAL 2011 ENTRY FORM AND RELEASE Please make sure to fill in ALL fields to ensure that your entry is accepted! Please attach a separate completed form

More information

Counterfeit, Falsified and Substandard Medicines

Counterfeit, Falsified and Substandard Medicines Meeting Summary Counterfeit, Falsified and Substandard Medicines Charles Clift Senior Research Consultant, Centre on Global Health Security December 2010 The views expressed in this document are the sole

More information

This is a preview - click here to buy the full publication

This is a preview - click here to buy the full publication TECHNICAL REPORT IEC/TR 62794 Edition 1.0 2012-11 colour inside Industrial-process measurement, control and automation Reference model for representation of production facilities (digital factory) INTERNATIONAL

More information

Berkeley Postdoc Entrepreneur Program (BPEP)

Berkeley Postdoc Entrepreneur Program (BPEP) Berkeley Postdoc Entrepreneur Program (BPEP) BPEP Mission: To foster entrepreneurship in the UC Berkeley postdoctoral and scientific community in order to move innovations from the laboratory to the marketplace.

More information

Chapter 6: Finding and Working with Professionals

Chapter 6: Finding and Working with Professionals Chapter 6: Finding and Working with Professionals Christopher D. Clark, Associate Professor, Department of Agricultural Economics Jane Howell Starnes, Research Associate, Department of Agricultural Economics

More information

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva

Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) April 2016, Geneva Introduction Convention on Certain Conventional Weapons (CCW) Meeting of Experts on Lethal Autonomous Weapons Systems (LAWS) 11-15 April 2016, Geneva Views of the International Committee of the Red Cross

More information

Australian Census 2016 and Privacy Impact Assessment (PIA)

Australian Census 2016 and Privacy Impact Assessment (PIA) http://www.privacy.org.au Secretary@privacy.org.au http://www.privacy.org.au/about/contacts.html 12 February 2016 Mr David Kalisch Australian Statistician Australian Bureau of Statistics Locked Bag 10,

More information

A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions

A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions A Critical Approach to Privacy Research in Ubiquitous Environments Issues and Underlying Assumptions Maria Karyda 1, Stefanos Gritzalis 1, and Jong Hyuk Park 2 1 Dept. of Information & Communication Systems

More information

Outline of Slide Presentation at 2018 NFAIS Blockchain Conference By Patrice A. Lyons (Alexandria, VA; May 16, 2018)

Outline of Slide Presentation at 2018 NFAIS Blockchain Conference By Patrice A. Lyons (Alexandria, VA; May 16, 2018) BLOCKS AS DIGITAL ENTITIES A STANDARDS PERSPECTIVE Outline of Slide Presentation at 2018 NFAIS Blockchain Conference By Patrice A. Lyons (Alexandria, VA; May 16, 2018) SLIDE 1: Introductory page. SLIDE

More information

MATLAB: Basics to Advanced

MATLAB: Basics to Advanced Module 1: MATLAB Basics Program Description MATLAB is a numerical computing environment and fourth generation programming language. Developed by The MathWorks, MATLAB allows matrix manipulation, plotting

More information

Anthony D. Rizzotti. Focus Areas. Overview

Anthony D. Rizzotti. Focus Areas. Overview Shareholder Co-Chair, Healthcare Industry Group One International Place Suite 2700 Boston, MA 02110 main: (617) 378-6000 direct: (617) 378-6009 fax: (617) 737-0052 arizzotti@littler.com One Financial Plaza

More information

D8.12 Architecture for Standardization V2

D8.12 Architecture for Standardization V2 Attribute-Based Credentials for Trust D8.12 Architecture for Standardization V2 Fatbardh Veseli, Dieter M. Sommer, Jan Schallaöck, Ioannis Krontiris Editor: Reviewers: Identifier: D8.12 Type: Version:

More information

Course Introduction and Overview of Software Engineering. Richard N. Taylor Informatics 211 Fall 2007

Course Introduction and Overview of Software Engineering. Richard N. Taylor Informatics 211 Fall 2007 Course Introduction and Overview of Software Engineering Richard N. Taylor Informatics 211 Fall 2007 Software Engineering A discipline that deals with the building of software systems which are so large

More information

California State University, Northridge Policy Statement on Inventions and Patents

California State University, Northridge Policy Statement on Inventions and Patents Approved by Research and Grants Committee April 20, 2001 Recommended for Adoption by Faculty Senate Executive Committee May 17, 2001 Revised to incorporate friendly amendments from Faculty Senate, September

More information

4 Pillars of Digital Game Based Learning

4 Pillars of Digital Game Based Learning 4 Pillars of Digital Game Based Learning A Structured Rating System for Games for Learning If we teach today's students as we did yesterday's, we are robbing them of tomorrow. John Dewey 6: Thur. May 15

More information

Government of Alberta News Release

Government of Alberta News Release Government of Alberta News Release "Education is a serious issue, and as Minister I need to do everything I can to ensure it is dealt with in a serious and professional manner." August 19, 1999 Dr. Lyle

More information

Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering

Pris Tool: A Case Tool For Privacy-Oriented Requirements Engineering Association for Information Systems AIS Electronic Library (AISeL) MCIS 2009 Proceedings Mediterranean Conference on Information Systems (MCIS) 2009 Pris Tool: A Case Tool For Privacy-Oriented Requirements

More information

GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS

GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS GOALS TO ASPECTS: DISCOVERING ASPECTS ORIENTED REQUIREMENTS 1 A. SOUJANYA, 2 SIDDHARTHA GHOSH 1 M.Tech Student, Department of CSE, Keshav Memorial Institute of Technology(KMIT), Narayanaguda, Himayathnagar,

More information

Pan-Canadian Trust Framework Overview

Pan-Canadian Trust Framework Overview Pan-Canadian Trust Framework Overview A collaborative approach to developing a Pan- Canadian Trust Framework Authors: DIACC Trust Framework Expert Committee August 2016 Abstract: The purpose of this document

More information